How To Block Access To The Internet

Table of contents:

How To Block Access To The Internet
How To Block Access To The Internet

Video: How To Block Access To The Internet

Video: How To Block Access To The Internet
Video: Block or Allow Applications Accessing Internet in Windows 10 Firewall 2024, May
Anonim

Situations when it is necessary to block access to the Internet for individual applications or restrict access to certain sites arise quite often. For this, hardware and software solutions are used, which are used both at home and in enterprises.

How to block access to the Internet
How to block access to the Internet

Instructions

Step 1

Antivirus programs are not the only ones recommended to users for safe surfing. Firewalls are a good addition to the anti-virus functions that routinely catch malicious files that have already entered the system. These are special solutions that monitor and manage the network activity of installed programs. For home use, software firewalls are most often used. With their help, the traffic of individual programs and running processes is monitored, access to ports is closed, and you can also block access to the Internet. If you do not have a firewall installed yet, read special reviews, tests and choose a product from the market.

Step 2

Using a firewall, you can block the Internet access of any installed program. To do this, place it in the list of blocked applications (depending on the interface in the firewalls of different manufacturers, this function may have different names, but the meaning of the term will be preserved). You can also completely block Internet access from your computer. To do this, put the firewall in the full blocking mode (policy). In this case, all traffic of any processes will be prohibited.

Step 3

On the company's information network, use a proxy server or hardware firewall for the same purpose. Read specialized sites of their choice, reference literature, and user guides for installing and configuring them. Since the Internet on all computers in the company will be distributed through an installed proxy server or hardware firewall, you can specify other parameters in its settings. In particular, block access to the Internet completely, restrict access to specific sites, close certain ports to protect against unauthorized exchange of information, as well as keep track of the traffic spent by each user.

Recommended: