Jump to content

"Compilation Of Tutorials, Guides, Tips & Updates"


dcs18

Recommended Posts

"Compilation Of Tutorials, Guides, Tips & Updates"

(The Playground where ordinary men & women dared to achieve the extraordinary)

 

 

 

 

"Preventing IDM From Dialing Home"

(monitor post 2 for all updates)

 

 

ATM, the Firewall Method works only, with COMODO, Kaspersky & Windows 10 Firewall Control

 

Solution for Users of other firewalls is coming soon  keep watching this space!

 

 

Notice:

 

Caution Note:

This guide is meant for Advanced Users & Intellectuals if you are a n00b, please do not proceed.

 

 

The Procedure:

Just follow the 5 steps mentioned below.

 

Step # 1:

As a precaution, check for and delete the encrypted Visual Protect 3.5+ key which Tonec could have possibly used in order to blacklist your IDM activation (thanks to Undertaker:

 

Spoiler

 

 

 

Step # 2:

As a precaution, ensure your IDM is disabled from starting-up with Windows (inspirational credits to FR33W1LL)—

 

Spoiler

fNmJXTR.png

 

 

 

 

Step # 3:

Use your firewall to block the following IPs:

 

Spoiler

List of 33 IPs (To Be Blocked) typed here, in Vertical Format for the sake of readability:

 

Please note the following list is an inclusive one:

108.161.189.32
169.55.0.224
169.55.0.225
169.55.0.227
169.55.40.5
173.255.134.84
173.255.137.80
174.127.73.80
174.127.73.85
174.133.70.101
174.133.70.98
184.173.149.184
184.173.188.104
184.173.188.106
184.173.188.107
185.80.220.22
185.80.221.18
185.80.221.19
202.134.64.74
202.134.93.17
207.44.199.159
207.44.199.16
207.44.199.165
50.22.103.114
50.22.78.28
50.22.78.29
50.22.78.31
50.97.41.98
50.97.82.44
69.41.163.149
69.41.163.49
75.125.34.148
75.125.34.157

 

 

Same 33 IPs (Mentioned Above) Reproduced Below in Horizontal Format:


108.161.189.32,169.55.0.224,169.55.0.225,169.55.0.227,169.55.40.5,173.255.134.84,173.255.137.80,174.127.73.80,174.127.73.85,174.133.70.101,174.133.70.98,184.173.149.184,184.173.188.104,184.173.188.106,184.173.188.107,185.80.220.22,185.80.221.18,185.80.221.19,202.134.64.74,202.134.93.17,207.44.199.159,207.44.199.16,207.44.199.165,50.22.103.114,50.22.78.28,50.22.78.29,50.22.78.31,50.97.41.98,50.97.82.44,69.41.163.149,69.41.163.49,75.125.34.148,75.125.34.157

 

 

 

 

 

Step # 4:

Batch file to clean-up your IDM (all credits to Dukun Cabul):

 

Spoiler

 

 

 

Step # 5:

This is the final step, just register your IDM until it gets activated (as per the following illustrations) you are done . . . . . . . . . . congratulations!!! tRsCXmU.gif

 

Spoiler

3w14iMG.png

 

 

 

 

Tip # 1:

Those who are receiving a nag despite the above procedure can use the following tip by Undertaker:

 

Spoiler

 

 

 

Tip # 2:

Those who wish to enjoy downloading rights to the official installer from the IDM homepage can use the following tip from PITA:

 

Spoiler

Just add the following entry to your IDM Options >> File types >> Don't start downloading automatically from the following sites:


*.internetdownloadmanager.com

Adding the above entry causes downloads to be grabbed by your default browser instead of, by IDM (without having to press any customized special key/s.)

 

 

 

Tip # 3:

Those who prefer the awesome GetRight Pro sounds can now download these files from the following link:

 

Spoiler
Sharecode[?]: /download/83ri0ou3b5udh3h/Sounds.rar

 

YahaJHh.png

 

 

 

Tip # 4:

Those who would like to backup their configuration and settings for IDM and for other programs & applications as well, can refer to the following:

 

Spoiler

 

 

 

Tip # 5:

Those who would like to personalize their IDM registration to brand it as per their own choice may want to download the following branding registry file (just replace the name fields with one of your own choice):

 

Spoiler
Sharecode[?]: /download/ibt7xdt09ewjre8/IDM_Branding.rar

 

 

 

Tip # 6:

Those who would like to use my personal Sites of Exception can execute a copy-paste of the following sites:

 

Spoiler

*.1fichier.com *.akamaihd.net *.alterupload.com *.bitshare.com *.bruneras.com *.cjoint.net *.crocko.com *.czshare.com *.datei.to *.depfile.com *.desfichiers.com *.dfichiers.com *.dl4free.com *.fbcdn.net *.fileserving.com *.filesonic.in *.freakshare.com *.freakshare.net *.internetdownloadmanager.com *.magix.net *.megadl.fr *.mesfichiers.org *.myvdrive.com *.netkups.com *.nitroflare.com *.nsanedown.com *.oboom.com *.load.to *.partage-facile.com *.piecejointe.net *.pjointe.com *.rapidgator.net *.share-online.biz *.sharingmatrix.com *.tatatele.in *.tdf-cdn.com *.tenvoi.com *.tinyupload.com *.turbobit.net *.turbobit.ru *.update.microsoft.com *.uplea.com *.uploaded.com *.bannedhost.net *.uploadhero.co *.uploading.com *.uploading.net *.vodafone.in *.voice2page.com *.we.bs *.wupload.com *.wupload.in *.yourfiles.to *.ziddu.com *bitshare.com *filepost.com *proxy.nsanedown.com *rapidgator.net *share-online.biz *turbobit.net *turbobit.ru *venea.net download.windowsupdate.com ecom.cimetz.com siteseal.thawte.com slics2.myftp.org webflake.sx

56uIjSo.png

 

Those who would prefer to simply import a registry entry containing all the above Sites of Exception can use the following download:—

Sharecode[?]: /download/5jqb8553z2h4zz1/IDM_Sites_of_Exception.rar

 

 

 

Tip # 7:

Those Users of the built-in Windows Firewall who would like to create the above IDM rules via Command Prompt can use the following tip from Michael*:

 

Spoiler

 

 

 

Tip # 8:

Those who would like to use my personal File Types can execute a copy-paste of the following extensions:

 

Spoiler

3G2 3GA 3GP 3GP2 3GPP 7Z A0* A1* AAC ACE AIF AMV ARJ APK ASF AVI BIK BIN BZ2 DIVX DMG DOC DOCX DSA DSM DSS DSV ESD EVO EXE F4V FLC FLI FLIC FLV GZ GZIP HDMOV IFO IMG ISO IVF LZH M M1V M2P M2T M2TS M2V M4A M4V MDB MKV MOV MP2V MP3 MP4 MP4V MPA MPE MPEG MPG MPV2 MPV4 MSI MSP MSU MTS OGG OGM OGV PDF PLJ PPS PPSX PPT PPTX PTX PVA QT R0* R1* RA RAM RAR REC REG RM RMM RMVB RP RT SEA SIT SITX SMI SMIL SMK TAR TGZ TIF TIFF TP TRP TS UUE VOB WAV WEBM WM WMA WMP WMV XLS XLSX XTREME Z ZIP ZIPX

fCx7QXW.png

 

Those who would prefer to simply import a registry entry containing all the above File Types can use the following download:—

 
Site: https://www.mediafire.com
Sharecode[?]: /download/41977d5tbkb9bb5/IDM_File_Types.rar

 

 

 

Tip # 9:

A special return gift to The Advocate of the hosts method:

 

Spoiler

Someone quite over-qualified seems to be attempting to imply that the hosts on the latest Windows 10 possesses magical powers which are superior and can achieve everything that a firewall can (and then, some more) — please do not try the hosts stunt on your IDM {it is just a mythological philosophy, a mere copy-paste from the formidable Russians that however, won't (cannot) work — everyone knows that the hosts does not have the capability to block IPs . . . . . . . . it never did!}

 

The hosts can only block hostnames — not IPs (not even a single one.)

 

The hosts cannot block on a "per program" or a "per apps." basis — it can only block the entire system.

 

 

 

Tip # 10:

Those looking for a fast and easy method to enter those IPs into your Windows Firewall can use the following tip from A.lemane:

 

Spoiler

 

 

 

Tip # 11:

The latest IDM integration add-on shall be kept updated here:

 

Spoiler
Site: http://www.mediafire.com
Sharecode[?]: /download/ozfp8bp6uz3vu10/idmmzcc.rar

 

 

 

Tip # 12:

Those looking for a fast and easy method to enter those IPs into your COMODO Firewall can use the following tip from bubbada:

 

Spoiler

 

 

 

 

 

 

"Illustrations On How To Configure Some Leading Firewalls"

 

 

The following configurations for ESET Smart Security firewall is brought to you, courtesy of hihello and software182:

 

Spoiler

Example only ESET Smart Security:

 

Please check out the illustrations by hihello and by software182, respectively.

 

 

 

The following configurations for Outpost Pro firewall is brought to you, courtesy of KP333 and JAPONE:

 

Spoiler

Example only Outpost Pro:

 

Please check out the illustrations by KP333 and by JAPONE, respectively.

 

 

 

The following configuration for Windows Firewall was initiated by Zarko:

 

Spoiler

Example only Windows Firewall:

 

Users of Windows Firewall need to create two separate rules (one Block rule + another Allow rule) for IDM as per the following instructions:

  • Ensure that the Windows Firewall service is on Automatic and that it is running.
  • Create two rules one Allow rule and another Block rule as per the following instructions

 

Create The Allow Rule:

Control Panel >> Windows Firewall >> Advanced Settings >> Outbound Rules >> New Rule.... >> Program >> Next >> This program path: >> Browse (to your Internet Download Manager directory path at IDMan.exe) >> Next >> Allow the connection >> Next (check / tick all the three) Domain, Private & Public >> Next >> (fill) Name & Description >> Finish.

 

Create The Block Rule:

Control Panel >> Windows Firewall >> Advanced Settings >> Outbound Rules >> New Rule.... >> Custom >> Next >> This program path:>> Browse (to your Internet Download Manager directory path at IDMan.exe)>> Next >> Protocol and Ports (don't make any change/s, here) >> Next >> Scope >> Which remote addresses does this rule apply to? >> These IP addresses >> Add >> This IP address or subnet >> (add the IPs addresses from the first post one at a time) >> OK >> Next >> Action >> Block the connection >> Next >> Profile (check / tick all the three) Domain, Private & Public >> Next >> (fill) Name & Description >> Finish.

 

Your Windows Firewall rules should now, look like the following (click the image for the bigger picture):

 

bmc5E1j.png

 

 

 

Illustrations for Windows Firewall Control:

 

Spoiler

One can use any firewall however, Users of Windows Firewall Control need to create two separate rules (one Block rule + another Allow rule) for IDM as per the following illustrations:

 

ZBbBKfN.png

 

qnOdEtH.png

 

Alternatively, lazy Users of Windows Firewall Control (WFC) can export both the above illustrated rules using the following download:—

 

Site: https://www.mediafire.com
Sharecode[?]: /download/nctpnt7ukq8nxtk/IDM_Rules.rar

 

 

 

The following configurations for Users of the Norton 360 firewall is brought to you, courtesy of abbasi:

 

Spoiler

Example only Norton 360:

 

Please check out the illustrations by abbasi.

 

 

 

The following configurations for Users of the Kaspersky firewall is brought to you, courtesy of IamBidyuT — honorable mention to Undertaker, MyIDM, PITA, Now, pamadhilwankalan & villasg too for their part of the contribution:

 

Spoiler

Example only Kaspersky:

 

Please check out the illustrations by IamBidyuT.

 

 

 

The following configurations for Windows 8 Firewall Control is brought to you, courtesy of anyname:

 

Spoiler

Example only Windows 8 Firewall Control:

 

Please check out the illustrations by anyname.

 

 

 

The following configurations for COMODO is brought to you, courtesy of masterupc:

 

Spoiler

Example only COMODO:

 

Please check out the illustrations by masterupc.

 

 

 

The following configurations for Private Firewall is brought to you, courtesy of mona:

 

Spoiler

Example only Private Firewall:

 

Please check out the illustrations by mona.

 

 

 

The following configurations for Avast Internet Security 2015 is brought to you, courtesy of villasg:

 

Spoiler

Example only Avast Internet Security 2015:

 

Please check out the illustrations by villasg.

 

 

 

The following configurations for Bitdefender Internet Security 2015 or Bitdefender Total Security 2015 is brought to you, courtesy of Dukun Cabul:

 

Spoiler

Example only Bitdefender Internet Security 2015 or Bitdefender Internet Security 2015:

 

Please check out the illustrations by Dukun Cabul.

 

 

 

Inspirational credits:

 

Spoiler

The idea to block IPs using a firewall germinated in my mind after a brief chance encounter with steven36 check out that hour of truth.

 

This one is for you steven36. RlW5CMh.gif

 

Link to comment
Share on other sites


  • Replies 7.3k
  • Views 1.1m
  • Created
  • Last Reply

"Updates & Credits"

 


 

(26rd March 2019) Thanks to Dukun Cabul for contributing his batch file:

IDM-AIO (All-In-One) elevated to the OP, above.

 

(26th November 2018):

Updated the Windows 10 Firewall Control (W10FC) tutorial.

 

(12th November 2018) Thanks to Togijak:

For his application which inserts 3 IPs into Windows Firewall in order to prevent AdGuard from phoning home.

 

(6th November 2018):

Rewrote A Blazing Fast, Softexia — Free From Malvertising from scratch.

 

(29th October 2018):

Blocking CCleaner From Sending Anonymous User Data.

 

(31st August 2018) Thanks to Dukun Cabul:

For his instructions on how the Kaspersky Internet Security (KIS) 2019 should be configured.

 

(30th April 2018) :

Updated A Blazing Fast, ZippyShare — Free From Malvertising.

 

(21st April 2018):

Updated A Blazing Fast, 2baKSa — Free From Malvertising.

 

(7th April 2018) Thanks to sledge101:

For updating his Generic IDM Batch Script 2018 to prevent IDM from calling home.

 

(10th July 2017) Thanks to Undertaker:

For updating his RegEx rules tutorial on blocking IP ranges in AdGuard.

 

(26th August 2017) Thanks to Dukun Cabul:

For updating his Internet Lock tutorial on how to prevent IDM from calling home.

 

(6th August 2017) Thanks to tomm:

For updating his ESET blocking guide on how to prevent IDM from calling home.

 

(5th August 2017) Thanks to dee.pee:

For his instructions on how to translate Avira Phantom VPN.

 

(13th July 2017) Thanks to bubbada:

For his .REG files which insert all the IPs into COMODO Firewall added to Tip # 12, at the main post above.


(2nd July 2017) Thanks to Undertaker:

For updating his creative Adguard fix on how to prevent IDM from calling home.

 

(20th June 2017) Thanks to Hamanokaito:

For updating his Registry Permission fix to prevent IDM from calling home.

 

(19th June 2017) Thanks to sledge101:

For his anti-DNS spoofing concept to prevent IDM from calling home.

 

(14th June 2017) Thanks to A.lemane:

For his cFosSpeed trick to prevent IDM from calling home.

 

(14th June 2017) Thanks to NokiAlpha:

For sharing 2 more IDM IPs to be blocked.

 

(12th June 2017) Thanks to sledge101:

For his heads-up on DNS resolving.

 

(10th June 2017):

Installing Greenify (Donate) On Privileged (ROM-integrated) Mode.

 

(7th June 2017) Thanks to Undertaker:

For his Visual Protect 3.5+ tutorial on how to be rid the annoying IDM nags.

 

(7th June 2017):

Reviving A Hopelessly Contaminated IDM.

 

(22nd December 2015) Thanks to knowledge for contributing his patch too:

Metro-free CCleaner, updated to the latest version.

 

(18th November 2015) Thanks to rudrax:

Fix a bricked Lenovo A6000 / A6000 Plus.

 

(14th October 2015) Thanks to subsystem:

New, updated Potplayer rules.

 

(10th October 2015) Thanks to A.lemane:

For his .BAT file which inserts all the IPs into Windows Firewall to Tip # 10, at the main post above.

 

(6th October 2015):

Firefox Enhanced With Tab Mix Plus (TMP).

 

(1st October 2015):

Classic Theme Restorer (CTR) pawns Australis.

 

(30th September 2015):

A Safe Data File Host Downloading — Free From Malvertising added to the main post (above.)

 

(28th September 2015) :

A Blazing Fast, MediaFire — Free From Malvertising.

 

(16th September 2015):

The Adblock Plus (ABP) guide updated with 3 custom global rules for Annotations on YouTube videos.

 

(14th September 2015):

A new entry — Windows Firewall Control (WFC) updated to the Configurations & Settings tutorial.

 

(12th September 2015):

IP updated at Method # 3 of the Blocking Skype Advertisements.

 

(4th August 2015) Tip # 9:

A special return gift to The Advocate of the hosts (copy-paste) method, updated at the main IDM post (above.)

 

(10th August 2015):

The Leak-proof & Tamper-proof WFC tutorial.

 

(4th August 2015):

Preventing Windows 10 From Getting Reserved Without Your Consent updated.

 

(15th July 2015) Thanks to Michael*:

For his site suggestion added to Tip # 6, at the main post above.

 

(4th July 2015):

Encrypted Google Search Engine.

 

(1st July 2015) Thanks to subsystem for suggesting the 25th IP:

169.55.40.5

 

(25th June 2015):

Friendly Tip added to the Firefox Memory-hogging Reduction tip.

 

(23rd June 2015) Thanks to Greed93 & Taker for reporting the 24th IP:

169.55.0.224

 

(20th June 2015):

New download link containing both the IDM rules (allow and block) added to the above post for the sake of lazy Windows Firewall Control (WFC) Users.

 

(07th June 2015) Thanks to Michael*:

For his tip (at post # 2563) on how to create the IDM rules into the built-in Windows using Command Prompt.

 

(29th May 2015) Thanks to Dukun Cabul:

For his screenshots (at post # 2501) illustrating how Bitdefender Internet Security 2015 or Bitdefender Total Security 2015 should be configured.

 

(9th April 2015) Thanks to mona:

For her screenshots illustrating with how the Private firewall should be configured.

 

(8th April 2015) Thanks to villasg:

For his screenshots illustrating with how Avast Internet Security 2015 should be configured.

 

(7th April 2015) Thanks to masterupc:

For his screenshots illustrating with how the COMODO firewall should be configured.

 

(7th April 2015) Thanks to steven36 for reporting the 23rd IP:

184.173.149.184

(6th April 2015) Thanks to IamBidyuT (honorable mention to Taker, MyIDM, PITA, Now, pamadhilwankalan & villasg):

For his screenshots illustrating with how the Kaspersky firewall should be configured.

 

Important Note from IamBidyuT:

{The older version, KIS15 MR1 (15.0.1.415) leaks the IDM IPs}

 

(28th February 2015):

The Taming Snagit tip.

 

(18th February 2015):

The TeamViewer Self-update prevention tip.

 

(14th February 2015):

The TeamViewer Advertisement pop-up prevention tip added to the main post (above.)

 

(10th November 2014) Thanks to anyname:

For his screenshots illustrating, how Windows 8 Firewall Control should be configured.

 

(3rd November 2014):—

Disabling the Maintenance Configurator within the Task Scheduler, completely.

 

(28th September 2014) Check out Step # 2 (inspirational credits to FR33W1LL):—

New illustration added to the main post (above) as a precautionary step.

 

(15thAugust 2014) Thanks to KP333 and JAPONE:

For their respective screenshots (at posts # 699 & 700) illustrating, how the Outpost Pro firewall needs to be configured.

 

(3rd August 2014) Thanks to abbasi:

For his screenshots illustrating, how the Norton 360 firewall should be configured.

 

(24th July 2014) Thanks to rkkdjb:

3 additional IPs added to Yamicsoft Windows ( 7 or 8 ) Manager under The Scope at the main post (above.)

 

(20th July 2014):

The Google (1e100.net) tip.

 

(19th July 2014):

WindowBlinds Nag prevention tip.

 

(17th July 2014) Thanks to the initiative by Zarko:

The configuration for Windows Firewall added to the main post (above.)

 

(16th July 2014) Thanks to exodius:

Yamicsoft Windows 8 or 7 Manager tip.

 

(9th July 2014) Thanks to sirri:

174.133.70.98

174.133.70.101

 

(15thAugust 2014) Thanks to hihello and Software182:

For their respective screenshots (at posts # 209210) illustrating, how the ESET Smart Security firewall needs to be configured.

 

(4th July 2014) Thanks to PITA:

For his useful tip on downloading the official IDM installer.

 

(19th June 2014) Thanks to 7h3Pr3d47oR:

Thread moved to the Guides & Tutorials section.

 

(19th June 2014) Thanks to exodius:

The main post (above) is updated with the IPs (additionally) in horizontal format just realized that most firewalls use this format instead of the vertical format.

 

(17th June 2014) Thanks to Dodel:

75.125.34.148
75.125.34.157

207.44.199.165

 

(17th June 2014) Thanks to sirri:

207.44.199.16

207.44.199.159

Link to comment
Share on other sites


Should be made as below?? @dcs18 otherwise IDM back home call home..

Firewall..block Inbound outbound

50.22.78.28 #Tonec Home Offshore software development
50.22.78.29 #Not Found Apache Redhat server
50.22.78.31 #Not Found Apache Redhat server
50.97.41.98 #Not Found Apache Redhat server
50.97.82.44 #?

69.41.163.49 #Red Hat Linux Test Page Apache Http server
69.41.163.149 #Red Hat Linux Test Page Apache Http server

173.255.137.80 #?
173.255.134.84 #?
174.127.73.80 #?
174.127.73.85 #?
184.173.188.104 #Home
184.173.188.106 #Home

184.173.188.107 #Home
202.134.64.74 #?
207.44.199.16 #Accepted?
207.44.199.159 #updated?

Link to comment
Share on other sites


207.44.199.159

207.44.199.16

what about those ?

Accepted and updated.
should read 207.44.199.165

Both 165 and 16, as well - seem legit. :)

Link to comment
Share on other sites


207.44.199.159
207.44.199.16
what about those ?

are they old, now is 184.173.188.107 registeridm.com ?

Link to comment
Share on other sites


Potentially 2 more :-

205.199.44.156 registeridm.com
205.199.44.16 registeridm.com
Link to comment
Share on other sites


@dcs18 i appreciate your effort good and complete tuto also for other member.

Link to comment
Share on other sites


When I started out on my own, I realized that the most dangerously important IP was 184.173.188.104 - check out my notes:—

Spoiler

50.22.78.28

mirror4.tonec.com
tonec.com
www.tonec.com

 

50.22.78.29

mirror4.internetdownloadmanager.com

 

50.22.78.31

data.internetdownloadmanager.com

 

50.97.41.98

star.tonec.com

 

50.97.82.44

mirror2.internetdownloadmanager.com

 

69.41.163.49

mirror.tonec.com

 

69.41.163.149

mirror.internetdownloadmanager.com

 

173.255.137.80

mirror5.internetdownloadmanager.com

 

173.255.134.84

mirror5.tonec.com

 

174.127.73.80

mirror3.tonec.com

 

174.127.73.85

mirror3.internetdownloadmanager.com

174.133.70.98

174.133.70.101

 

184.173.188.104

internetdownloadmanager.com,
mirror6.internetdownloadmanager.com,
www.internetdownloadmanager.com
www.mirror2.internetdownloadmanager.com
www.mirror5.internetdownloadmanager.com
www.mirror6.internetdownloadmanager.com

 

184.173.188.106

secure.internetdownloadmanager.com

 

184.173.188.107

registeridm.com
secure.registeridm.com
www.registeridm.com
www.secure.registeridm.com

 

202.134.64.74

rev.dyxnet.com

 

Link to comment
Share on other sites


this is very useful

When I started out on my own, I realized that the most dangerously important IP was 184.173.188.104 - check out my notes:--

this is very useful
Link to comment
Share on other sites


@dcs18 i appreciate your effort good and complete tuto also for other member.

Just testing the waters, here - if it is well taken by our members, shall add some more illustrations and maybe then the staff might consider shifting it to the tutorial section. :dunno:

Link to comment
Share on other sites


When I started out on my own, I realized that the most dangerously important IP was 184.173.188.104

yeah, it's the most important IP of the IDM lot, and is involved in getting you updates. When blocked, you cann't update IDM from inside the "check update tool". I already had half-of-the IP's blocked here. Now, adding few more from your useful post @dcs18.

Link to comment
Share on other sites


Complete set of (illustrated) rules added for the benefit of Users of Windows Firewall Control. ^_^

Link to comment
Share on other sites


@ iih1

Have just added an illustration for Users of WFC - check out my OP. ;)

and what about for other firewalls are these rules applicable for other firewalls too?

Link to comment
Share on other sites


@ iih1

Have just added an illustration for Users of WFC - check out my OP. ;)

and what about for other firewalls are these rules applicable for other firewalls too?

Oh yes, one can use any firewall - the Windows Firewall Control is just an example. :)

Link to comment
Share on other sites


@dcs18 Do I need WFC to use this method? Would it work if I only use native w7 firewall?

Link to comment
Share on other sites


  • Matrix locked this topic
  • Reefa unlocked this topic

Archived

This topic is now archived and is closed to further replies.

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...