How to trace traffic

How to trace traffic

If you began to notice that you cannot go from time to time on-line though connection is active or pages are loaded extremely slowly, so you need to understand what of programs go on-line and what data volume is downloaded. For this purpose there is a set of different programs, one of which - Comodo Firewall Pro in Russian.

It is required to you

  • - computer;
  • - Internet;
  • - browser;
  • - Comodo Firewall Pro program.

Instruction

1. Download a distribution kit of the Comodo Firewall Pro program from the official site of http://www.comodo.com/ or http://www.comss.ru/page.php?id=239. Install the program, having started the installation file. The program will ask to delete programs with similar functions: it concerns any program with the word firewall in the name. Reboot after the end of installation. Also it should be taken into account the fact that similar programs should be installed in the system catalog of rigid disk on the computer.

2. Right after loading of the operating system the Comodo program will begin the analysis of all programs requesting Internet connection in passing asking about settings. You can prohibit or allow any program access to network. If you put a checkbox near the Remember My Choice point, then this rule will constantly work. The program will set also many rules automatically therefore check all connections which this utility allows or blocks.

3. Broader settings of the program are available in the Monitor of Applications window where the list of all programs ever requesting connection to the Internet with the indication of port and the protocol of connection is formed. Double-click by the name of the program to open a window of fine tuning of each application.

4. For viewing all connections, come on the Activity panel. In the Connections bookmark all programs connected at present to the Internet are displayed. In "Log" the record of all important events is kept. Having configured work of Comodo Firewall Pro, you will keep all network traffic and also access of any program to the Internet under control. You at once learn if any new program including the virus, will try to download something from the Internet.

Author: «MirrorInfo» Dream Team


Print