Firewalls watch community requests, open up or near ports on the pc. These are generally the very first echelon within the defense procedure. Structure and apply a firewall program. No less than try out anything like netstat that also has permissions to close ports or warn on suspicious community requests. https://mariohiigb.activablog.com/27797475/5-simple-techniques-for-pay-someone-to-take-programming-assignment