Would you leave the doors to your home office unlocked and the windows wide open? We didn't think so. But that's just what you're doing when you add a DSL or cable modem Internet connection to your PC. That's because an always-on connection relies upon a static IP addressand an address that doesn't change is an easy target for a hacker. To keep the bad guys at bay, install a software firewall such as our MVP pick, Computer Associates' SessionWall-3 (see page 196). Here's what you need to know to make sure you're secure.
Smart Setup
Installing SessionWall is fairly straightforward on a Windows 95 or 98 systemjust follow the onscreen prompts. But if you're running Windows NT, follow these tips for a smooth start: First, when SessionWall asks you for a username, choose Administrator so you'll have full access-privileges. Second, when given the choice of running SessionWall as an NT service or a stand-alone application, select Run as an NT Service. This way it will load automatically and your system will always be secure.
Shut Out Sites
Want to block a particular Web sitesay your part-time help spends too much time on sports.com? Choose Functions, Monitor, Block, Alert Rules, and then select Edit Rules. Select New, Insert Before, and choose a name for the new rule, such as Sports Block. Click the Host folder and choose Add. Select Host and Add again. Now enter the URL and the IP address if you know it. If you don't have this info, click Find Host Address and SessionWall will fill in it for you.
Spot Attacks Early
You hope it never happens, but there's a chance that someone will eventually try to hack your connection. SessionWall makes it easy to spot an attack in progress and identify the culprits so you can freeze them out. When SessionWall detects an attack, the Bad Guy icon on the toolbar begins flashing. Simply click it to bring up the Action Properties dialog box to see the type of attack, the date and time it occurred, and the names of the target and source machines. Rather not know the unpleasant details? Right-click on the Bad Guy icon and choose Ignore This Activity.
Attack Back
Now that you know the hacker's identity, you can block him or her from accessing your systemand let the culprit know you're onto the attack. Select Monitor, Block, Alert, Rules, and in the Actions Properties dialog box select Define Blocking Rule. Type the message you want to send to the system attempting to get into your system, such as Access Denied. In the example at left, we've blocked all FTP access from a single host.