Professional Documents
Culture Documents
b) Run the following commands in Linux shell / DOS prompt and show the output-
Step5: Here we browse the location of the exe file which one we are going to
block (for ex- Chrome)
Step6: Here we choose “Block the connection” radio button and click next
Step7: Leave the below options by default and click next
Step8: Give a name to the rule. Description field is optional
Tip: give the program name to easily remember for later purposes
Step9: Repeat the same steps followed in Inbound rules for Outbound rules
Step 10: To unblock the access we will click on “Disable Rule” and the .exe file
will be enabled
b. ipconfig
c. ping
d. traceroute/tracert
e. nestat
f. route
g. telnet
h. ftp
i. nslookup
j. arp