The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,470 other followers

Archive for the ‘Firewall’ Category

Windows FireWall administration: I need to put some time in learning netsh

Posted by jpluimers on 2018/07/16

It seems netsh is something different than bash or csh as it is the command-line interface to many (all?) Windows Firewall settings.

So I need to put some time into learning it.

This gives you all the names of firewall rules, ready for text searching it (with find, grep, etc):

netsh advfirewall firewall show rule name=all

An alternative might be PowerShell as it too has a lot of Windows Firewall plumbing: [WayBackHow to manage the Windows firewall settings with PowerShell – James O’Neill’s blog

Choices, choices.

–jeroen

via: [WayBackwindows firewall – How can I use netsh to find a rule using a pattern – Server Fault

Posted in Firewall, Power User, Windows | Leave a Comment »

Windows Firewall: Block rules take precedence over Allow rules

Posted by jpluimers on 2018/05/07

Reminder to self for Windows Firewall: Block rules take precedence over Allow rules (see * below as actually it is even more complex); [WayBackFirewall Rule Properties Page: General Tab has

Firewall rules are evaluated in the following order:

  1. Allow if secure with Override block rules selected in the Customize Allow if Secure Settings dialog box.
  2. Block the connection.
  3. Allow the connection.
  4. Default profile behavior (allow or block as specified on the applicable Profile tab of the Windows Firewall with Advanced Security Properties dialog box).

Within each category, rules are evaluated from the most specific to the least specific. A rule that specifies four criteria is selected over a rule that specifies only three criteria.

Which means that this will block TCP port 1024 traffic to bar.exe:

The Block rules are inserted by Windows if you click “Cancel” on a dialog like this (note the lowercase path, despite the application being at C:\Program Files (x86)\Foo\Bar.exe):

Read the rest of this entry »

Posted in Firewall, Infrastructure, Power User, Windows | Leave a Comment »

iptables debugging « \1

Posted by jpluimers on 2017/11/28

Using the TRACE target: [WayBackiptables debugging « \1 via [WayBack] iptables Debugging using the TRACE chain – Kristian Köhntopp – Google+

Docs:

TRACE
This target marks packes so that the kernel will log every rule which match the packets as those traverse the tables, chains,
rules. (The ipt_LOG or ip6t_LOG module is required for the logging.) The packets are logged with the string prefix: “TRACE:
tablename:chainname:type:rulenum ” where type can be “rule” for plain rule, “return” for implicit rule at the end of a user
defined chain and “policy” for the policy of the built in chains.
It can only be used in the raw table.

Way more details in the linked article.

–jeroen

Posted in *nix, *nix-tools, Firewall, Infrastructure, iptables, Power User | Leave a Comment »

Posted by jpluimers on 2017/06/30

It’s such an all time classic from 2006 that people even kept scans of the original 2006 Computer World publication by [WayBack] John Klossner.

Over the last few years, it has done its round over the internet a few times, so I did some digging for the scans, colour and mono originals.

Data security versus Human Error.

In this corner, we have firewalls, encryption, antivirus software, etc. And in this corner, we have Dave!!

[WayBackJohn Klossner Cartoons: Computer World has the original black and white version: it’s even a gif!

Way better than the scan from paper: [WayBackShackF00 » Weekend Round-up: Google Issues and a Sad-but-True Comic

In 2014, Spiceworks re-ran the black and white one: [WayBackAnd in THIS corner we have Dave! (Funny cartoon) – IT Security – Spiceworks

In 2015, Wombat Security published a coloured version on social media, and even bigger too: not just large, huge as well (:

–jeroen

via: [WayBack] Dave – CodeProject – Google+

Read the rest of this entry »

Posted in Encryption, Firewall, Fun, Power User, Security | Leave a Comment »

Batch file to open a specific TCP port in Windows 7 / 2008 Server and up

Posted by jpluimers on 2015/09/18

Thanks to the answer by Kevin Richardson on How to open ports on Windows firewall through batch file, I wrote this batch file that uses the add command of the Netsh AdvFirewall Firewall Commands which requires Admin privileges to run:

–jeroen

via: How to open ports on Windows firewall through batch file – Stack Overflow

Posted in Firewall, Infrastructure, Microsoft Surface on Windows 7, Power User, Windows, Windows 7, Windows 8, Windows 8.1, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2 | Leave a Comment »

 
%d bloggers like this: