Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
Hope that helps :D
I would like to know which ports to clear for when friends join my "SP" game.
My NAT 3 internet IS "funky" and I need to know the ports which the game uses to connect to the server.
also don't suggest someone to turn off their firewall in the future, suggest they declare the program 'safe' instead of turning it off.
What is up with people giving backwards feedback?
Turning off security entirely is not a solution, it's fighting symptoms.
Getting the right ports is what's needed and the only subject of this thread.
I have to port forward on most games as well, sometimes thats enough, sometimes I have to set it as a exception along with the port inside my firewall, and other times, I have to disable it entirely for private networks.
I play multiple games with my windows firewall off without getting any sort of virius, or malware, mostly because when I turn my firewall off, I don't go and browse the internet and click random links in emails.
Despite the fact the turning your windows firewall off is never strictly "safe" its not as dangerous as some would say, especially as long as you are using known trusted sites, and have a third party anti virus / firewall, which most people do anyway.
Also, if you have to port forward for every single game you play, that is typically caused by having strict NAT, which acts as another layer of security on top of everything else, (although thats not what it's designed for) so most of the viruses and malware you get are either going to be from downloads, or opening untrusted emails.
EDIT: Changed some wording.
Just to add; your firewall might very well need port forwarding.
Comodo's firewall does. You have to apply them in the 'Global Rules' section, as if you were port forwarding on your router.
That's not true.
Even having your UTP cable plugged in or being connected through WiFi is enough to get certain types of malware on your system, if you do not have security turned on.
I'd like to debunk your first argument as well. You won't actively see a lot of malware infections.
That's the biggest mistake a lot of people make!
Do you seriously think that the creators of malware would want you to easily spot their software so that you can easily thwart them? Of course not! They're trying their best to find exploits to use and stay hidden, so that you will never even try cleaning it, because you don't notice it.
Even trusted sites can become infected. If not through being hacked - you can't know until you hit the page first time of the day - it can be through advertisements if you don't block those. A website has little control over which advertisements are displayed. That's all done by the ad company that rents out the ad space. And in turn, they can't guarantee for a 100% that the ads they serve are completely malware free.
I will say that from a professional standpoint, I don't trust the built-in Windows security apps.
He did mention he's behind a NAT3 router.
EDIT: Another good point is foreign systems on your own network, or you bringing your system to a foreign network.
You do not know if the device your friend uses on your network is completely clean, but it will be behind the security of your router for those specific attacks.
The only thing that would stop those attacks is security software.
Same applies if you bring your device to another network that's not yours.
You have no idea what other systems are connected and whether or not those are infected.
This is the main reason public WiFi networks are such a cesspool of problems.
Also haven't had any personal information stolen in years, except for websites that get hacked, obviously hackers can still get information that way.
And once again, notice i mentioned "third party anti virus / firewall"?
As far as everything else, generally, your right, technically, infact, if I suggested any of these things professionally, in a work environment, I would probably get fired, or at least shot down immediately.
True again about foreign systems on your network, but as you may know, windows firewall isn't very effective at all from blocking things from outside your network, let alone inside. Thats why worms are such a issue. Which im sure you know as well, and if someone has a worm on their system, in your network, chances are your windows firewall, or your third party firewall, wont stop it either way.
"I will say that from a professional standpoint, I don't trust the built-in Windows security apps." Yet you trust them so much that you believe they need to be left on 100% of the time?
Look I don't care if he tries my suggestion or not, I know what works on my system, and thought I would share to see if it worked for him, if it did, good, if not, fine, but it works for me.
Keep in mind, I understand that on a strictly by the book level, turning off your windows firewall is never a good idea. (Preparing to take the CCENT and A+ atm) But I also know, that turning MY firewall off for a few hours isn't going to destroy my computer. Or fill it with malware and viruses.
In regards to your scans, I'll only add that it is wise to keep in mind those scans work less against zero-day threats than active monitoring.
My earlier points, in case that wasn't clear, were about not shutting down your security, regardless which software that is. Using the Windows stuff is still better than not using anything at all, although I strongly advise anyone I help to get something better.
Turning your firewall off is a calculated risk.
Sometimes, I can't get a game set up properly to host it, and to save time I opt to shut it down for that session.
In theory, it is possible that in that time I get infected with a trojan that in turns installs a rootkit, turning itself invisible when the security software comes back online.
'Filling it' is an exaggeration, but you know as well as I that one infection could create a backdoor for many others, creating a chain event.