How to set up an exchange for access to the Internet. How to fence programs access to the Internet. Batkivsky control on PC: expanded capabilities

A high-powered smartphone or a tablet, which is the same for a skin child, is worthy of majesty, privilege and cry, but not an innocent virtual world. To protect an inconsistent type of shkydlivoї іnformatsії, as well as to spend an hour, spending it on the Internet and playing games, to help you protect your father's control. Today they are being developed not only for stationary computers, but also for mobile devices based on Android.

I encourage you to get familiar with dekilcom programs, which allow you to filter and block unwanted content, as well as to use other functions for your father.

Possibility of Google Play

The simplest zasіb batkіvskogo control є in Android for locking - tse one of the functions of Google Play. With this help, it is possible to fence the installed programs, so that children do not come for a century.

For whom:



The list "Nalashtuvannya filtratsii content" є 3 divided: "Programs and games", "Films" and "Music". If there is a need for music with the texts of an open source, then access to it can either be allowed more or less.

Two other divisions have gradation per century (rating) - from 0 to 18 years. Choose those that match the age of your child.

Unfortunately, the Russian version of the Batkiv control of Google Play does not filter all the content that the store has. For example, you can’t get a child to get a comic book, or a book, to avenge an unchild information. In addition, this option is not very effective, as if a child is using a browser, then the fathers of children older than 7-8 years will sooner install an okremiya zahisny appendage - one of the quiet ones, about which I will tell you further.

Batkiv control over anti-virus vendors

Batkivsky control on Android can be organized by means of an antivirus, which, perhaps, is already installed on your child's phone or tablet. Such products include, for example, F-Secure SAFE and Quick Heal Total Security.

Іsnuyut okremі programs tsgogo klass vіd vіrobnikіv antivirusіv. You can win as an addition to the main product, as well as on your own. Let's look at them closer.

Safe Kids is available in paid and no-cost versions.

Among yoga functions:

  • Filtering web content.
  • Search filtering (allows you to turn off search search sites with an unimportant amount).
  • I’ll block the block at the installations for an hour (for a wink of calls).
  • Appointment of geographical roztashuvannya (father can be recognized, where the child is known).
  • Monitoring of vikoristannya I will add that overpowering calls to the phone or e-mail to the father.

The program is easy to tweak and just twist. All the main care for the protection of the child's safety in the new presence. It should be like a control for a child, and a child of a young age. Ale, you can only greet him for mutual housekeeping, shards of defense against uninstallation in the new world: like a child, blocking the house, you can see the program without any problems.

Norton Family parental control (Symantec)

Norton Family can be as powerful as a Kaspersky product. І is also available for paid and cost-free options.

Available for the non-cash version:

  • The function of monitoring the review of websites (journal control).
  • Filtering web content.
  • Negajne properedzhennya batkiv about nebazhany ditini.

For a fee, there is an opportunity to vibrate with access to programs, create a call about the recruitment of the building for 90 days, send an e-mail a few or a few messages about an hour, conduct a child behind an annex, and about a child on a new one.

On the vіdmіnu vіd SafeKids, Norton Family can zahist vіd vіdalennya, but deyakim especially cunning pіdlіtka all the same vdaєєїї vіdklyuchiti.

The number of possibilities is deshcho wide. Available for the non-cash version:

Dodatkovy funktsional more pіdіyde fathers of young schoolchildren, like trivaly hour perebuvayut pose home.

Autonomous programs for Batkiv control

Mabut, one of the most functional and flexible tools of Batkiv control, but paid (at $5.95 per quarter).

Among yoga possibilities:

  • Safe search in all popular browsers.
  • Individual custom blocking sites (black and white lists).
  • Exchange of web surfing for an hour (you can create a layout of the skin day of the day).
  • Distance keruvannya nalashtuvannyami and rules (from a grown-up smartphone).
  • Let's change the hour of the coristuvannya.
  • Call about the activity of the children in the community (hours and updates of the websites, polls).
  • Possibility of the real hour allows you to block children's access to singing content.
  • Attachment of programs that are not recognized for selection by children (it is customary).
  • Blocking programs for an hour of work.

Regardless of the large number of functions, SafeKiddo is easy to install. From the other side, from the other side, with the help of others, you can control a lot of children, vicarious skin for the rule of thumb.

Kids Zone Parental Controls

Kids Zone Parental Controls manually select for creating for children okremikh profiles on the outbuilding, as if growing up. The program is recognized as important for malyuki. Available for non-cost and paid options.

For help from Kids Zone, you can:

  • Create an individual profile for your skin child on your phone or tablet, install your personal trellis on your work desk. The profiles of the children can only be taken care of by those programs, if you please.
  • Zahisti nalashtuvannya programs to change for help pin-code.
  • Surround the hour of corystuvannya by building.
  • Block outgoing calls and SMS.
  • Deny access to the Internet.
  • Stop downloading and installing programs from Google Play and other devices.
  • I will block access to the parameters and add that special data to the oblique record of the father.
  • to conduct monitoring of vikoristannya I will attach children.
  • Remove the blocking of pressing one button (if you need a call to the call).

The insufficiency of Kids Zone is only in the fact that it is not translated by Russian language. Ale is not bad at all.

Like fathers start talking to a child, and then we’re talking, so the computer’s chirpy chats about the possibility of free access to the Internet, and then the possibility of blocking access to it. What are the reasons why people are worried about the Internet, and what simple methods can be reached, we can try to look at this article.

You can blame your computer for that slippage, because you don’t have to pay for traffic, which will be charged for your traffic, otherwise you will have uncontrolled access to your children’s, relatives, and workers’ helpers. Also, it was well understood to fight the round of information for the hour of work with special programs and confidential information. As an option, it is necessary to block access to the least game or other programs, not blocking access to the least, but rather blocking access to the Internet.

We would like to suggest to you a few more or less radical methods of blocking the Internet on a computer under Windows 7 lockdown:

  • Turning on the tie adapter in the system
  • Wrong proxy installed on system settings
  • Blocking of external calls for the help of a built-in firewall
  • Blocking the firewall behind the help of third-party firewalls
  • Establishment of Batkiv control in specialized programs and antiviruses
  • Return to fahіvtsіv to block access to the Internet

1. Turning on the tie adapter in the system

This cardinal method of getting-purely allows the computer to communicate with the outside world, whether it be the Internet or a local network. You need to enter the “Appliance Manager” (prior cost Panel maintenance / System and security / System),

de, knowing your mesh card, click on її name with the right mouse button and select the “Remove” item:


Merezha card will be enabled for all cloud recordings of the computer and turn it to work, it will be possible to do it as soon as possible with the rights of the administrator, going all the way back and choosing the "Rear" item.

2. Installing the wrong proxy on system settings

How can I change the program to pardon the proxy server (for example, you can specify the address of your computer, 127.0. However, one of the shortcomings is the ability to easily turn on yoga, if you know that the coristuvach knows, de tse robiti - the border of the coristuvacha has no rights for which to fix it.

After launching Internet Explorer and opening the “Browser power” button on the “Connection” tab, click the “Settings” button:


Set the proxy server address to 127.0.0.1 - if your computer does not have a proxy server installed, programs that use the system proxy will be completely fooled.

Unfortunately, the skin program does not match the address of the system proxy, so, perhaps, this method is not designed for the skin.

3. Blocking of outside calls for the help of a fired firewall

For the help of this method, you can block access to the TCP protocol, blocking access to the Internet for programs, as they try to take access there.
Open the firewall settings (Keyware Panel / System and Security / Windows Firewall) and select “Advanced Settings”:


We gave you the need to create a new rule in the “Rules for external connection”:


The rule is necessary to create "for the port":


Specify the rule for all distant ports:


Select “block connection”:


Let me know the name of the rule for you:


After the rules have been created, you can change the connection - the connection to the Internet is blocked. Now, if you can turn on yoga, then start again.

Please note that changing the firewall settings is only available to employees with administrative privileges.

Exchange a smug pass on your computer to save money for those you don't want to. It’s even better for those who can charge for obligatory traffic, and can help you avoid overpaying. We are going to show you the tools to help you improve your bandwidth.

In Windows, there is a way to exchange the line pass, but at the same time, we give only a basic service and we don’t know how to work on the wine itself. In this rank, it’s better to turn around to third-party decisions.

Windows 10 Metered Connections

NetBalancer

  1. NetBalancer will show you a list of currently active processes on your system and any related processes associated with them. A graph is shown below it, you can once again succumb to it, where bursts of smog are passed through. Point your mouse at the chart, and you can work on how to improve your bandwidth at the same time.
  2. To increase the bandwidth of the program, find it in the list and click on it. You can change the "Priority of acquisition" and "Priority of acquisition" menus to adjust your selection based on the filters installed in front. It’s handy, like, for example, but you still don’t want to install programs on the robot, but you want a little more, so that other programs win a lot of traffic, so you’ll need to stink. In addition, in the list, which is being opened, select and assign limits to the number of traffic.
  3. You can also create those yourself in the head window, vicorist green and red marks of the arrows at the upper part of the window. Another handy function here is to click on the red arrow to block all traffic. More koristuvachs can stick out the filter rules.
  4. NetBalancer is offering a free trial version for 15 days, after which you will need to pay a one-time fee of $49.95 to keep the program running. In addition, you can try yoga pose with a trial version, just like a wire monitor.

NetLimiter

  1. When you run NetLimiter, you will see a list of all your open programs along with their current traffic collection. Obviously, these programs will be able to increase the bandwidth of the building, lower, or manually identify those, which will save more, lower is required.
  2. The boundary for the locks is set at 5 KB / s for zavantazhennya that vivantage, which can be quickly increased by setting the ensign for the singing row. To change the values ​​for the lock, right-click on the mouse to open the rules editor. On the “Rule” tab, you can change between smugs of the pass.
  3. Go to the "Planner" tab and you can set the start-up of those rules. Press "Add", and then create the necessary rules. For example, you can set your web browser to whatever bandwidth you set.

Net-Peeker

  1. Net-Peeker may have a simpler interface. At the upper part of the screen you can bachiti, how to activate the interest and the interest, as well as access to the "Setup" screen and other functions, as if the program is propagated as a "system protector". We are just focusing on the possibility of bridging throughput.
  2. For any process from the head window, or for a singing lace session, you can right-click on the mouse, so that you can cut it off. You can close the security, so that you can specify between the smugs of the transmission, or press Abort connection, so that you can turn it off again.
  3. Net-Peeker is giving you a 30-day trial to try out all the features. If so, you can continue to win the program for 25 dollars. If you need the ability to handle billing systems, you need to get a group license, as it costs $125 for five agents.

Video: Internet Traffic Control Software

Another relevant topic for the dbailivih batkіv is the time of the exchange, which is carried out by a child on the Internet.

Simply and clumsily, without frills, a way of solving problems, which I see as a priority.

When looking for ways to exchange children in the form of a permanent exchange in the cellar, the Internet, I asked you to enter the installation of special programs on the computer, or anti-virus packages with this function, and the connection of darts to the PC before entering the administrative inlet "remin".

Leather from options may have its own advantages and shortcomings and leather from them is not ideal. In different programs - material vitrati and adjustment programs, in different administrative and physical influxes - father's nerves, more satisfied with such methods - do not bring.

The majestic little share of the proponated software (PZ) - the robot is only on the outbuilding, on which it is installed. Tobto. on the outbuilding, where children lie and until they can’t, access is more low її fathers, including for testing, change the adjustment of the PZ, or else you can see it, and sometimes the price may appear, if you ask for such a PZ.

There are a large number of outbuildings with different operating systems, with the help of access to the Internet, I overthrow the possibilities, which are hoped by PZ retailers (For example, an one-hour PZ robot on Windows, Linux, Java, Android, iOS), Internet” on all outbuildings near the home fence.

So the very lack of handiness of the "century of success and victory of marketers" can be brought by the appearance of new outbuildings in the home, on the border between the PZs, you can’t see it, or through the daytime, the fathers themselves will be sorted out, or through the novelty, I’ll add, that block the PZ on NE .

At my home, 12 outbuildings can access the Internet: telephones, tablets, laptops, a stationary PC, so the problem of ease of installation and management is even more relevant. With whom it is noted that at the same time a computer without a connection to the Internet for children is not enough cicavia.

The method, which I propagate, is based on the setup of a home router, on the butt of TP-Link routers, which can be found in those who have found this function.

Benefits of this method:

  • The router is often the only way to go to the Internet for everyone without a blame, adding to the home network (with the exception of the connection of tariffs for the Internet from low-cost operators to smartphones or tablets with such a function). Tobto. having installed only one router, you will control all the attachments at once
  • Router in a robot, canopy installed on outbuildings
  • Baiduzha router with new additions
  • The router can be “translated anniversaries” on a PC, so that blocking can be done
  • The router is fixed one-time, from setting a folding password to enter the router. Takozh login and password for connecting to the Internet varto save in the taєmnitsі
  • Once you've updated your router, you can save the update to an okremium file.
  • When victorious folding password on the router, the router can be thrown off, with which all connections to the Internet will be erased. Without knowing the login and password of the provider, on the connection to the Internet, the router will be just cold
  • The entrance to the router is no longer needed for setting up, or change the setting. It happens very rarely, the chance to change and remember the password is minimal
  • The fact that the router was dropped and connected to the Internet "creak" is important
  • Update the Internet and the changes you made to the "Batkiv control" from the backup file, it takes about one time, 50 seconds of them - the whole process of resetting the router
  • Even though a child is still not remembered for the fathers to get around all the designated options, then in the new otriman there is not the best knowledge of his life. 🙂
  • So the very change of the standard login and password on the router, to hack about a part of the evil-doers from the Internet, by brute force to know routers with strong passwords from the Internet.

Nіvelyuvannya nedolіkіv, on the right of the Batkіv themselves:

  • Knowing the login and password on the router, you can change the password for that login, save it in the right place)
  • Knowing the login and the password on the Internet, you can throw off the router and re-establish access to the Internet (it’s very rare to go to the router, the fact of dropping can not be remembered for a long time)

Well, the worst thing about being a zahist is not to tell, for the help of some way, you robbed.

TP-Link routers can filter the IP-address function, through the setting of which it is possible to access the devices to the Internet.

Moreover, we do not create a great list of outbuildings, as it is necessary to separate from the Internet. We are creating a “more list” of three attachments with permitted security access, and if any other attachment is not on the list of three restrictions, access is an hour before the next Internet.

At the same time, it will be considered for attaching access to the Internet from 10 years old to the 7th, but on the basis of their knowledge, you can add rules, for example, for attaching access at a regular hour, so that the child “don’t forget to eat” . .

The butt does not mean high level of computer literacy, may be explained and not foldable.

Before the cob of the cob, nail the following:

Setting up a TP-Link router

Set up DHCP and reserve address

MAC addresses are a unique identifier that I hope the next card will be attached to. MAC addresses are constant and individual for skin attachment.

For this application, the MAC addresses 1,2,3 will be attached to me in the house and lie up to the extensions, access to the Internet is not to blame for the surroundings.

All other outbuildings are 4-10 minutes apart for an hour of access to the Internet.

Copy/write/remember the MAC address of the add-on with ID 1-3. Tsі pristroї will be mother postіynu and fixed address in the home mérezhі.

The column assigned to IP addresses shows us the range of our home address - 192.168.0. N. De N- A number in the range from 1 to 254, for DHCP locks, it starts to see addresses starting from 100, then. changing IP addressing: 192.168.0.100.

Image 1. List of add-ons that took the address of the type of DHCP service of the TP-Link router

Go to item below Reservation address.

We add three outbuildings with access, so we won’t be able to interleave in an hour.

We press the button Add and remember the fields in 3. Reserved IP address behind the main extension.

2. Reservation of IP addresses for singing outbuildings

We press the button Add and in the window, as it appeared, enter the MAC address of the first extension, in the application: 10-3B-59-8A-EE-0A, assign it to the SIM extension at the address 192.168.0.10 (you can choose whether it is in the range of 192.168.0 . 2 up to 192168.0. 254 , IP addresses 192.168.0.1 - already attached to the TP Link router).

Selectable MillNoted, What would be the reservation.

3. Reservation of IP address behind the main extension

In this way, to this list we add all the attachments, as if the mother is responsible for the unlimited hour of being on the Internet. ( div. Image 2. Reserving IP addresses behind the singing outbuildings).

Added 3 additions to the stock.

Notification of protection and filtering settings IP-address

Let's go to point Intermediate screen and check the boxes next to:

  1. note Intermediate screen
  2. note Filtering IP address
  3. Block packets that are not specified in the filter rules, pass through the router

Without the inclusion of the first item, the router cannot be victorious whether you see filtering, make it look like they are marked with a tick.

Another item will be needed by us in the lesson. IP filtering.

Figure 4. Highlighting the inter-merge screen and IP filtering

The third point allows us to win the “white list”, tobto. I would like to allow unrestricted access only to designated outbuildings, of which I have a total of 3 out of 12. Since you have 12 outbuildings and only one of them needs to be surrounded by access, let’s change the option Allow access to the Internet to given computers, assigned to the inclusion rules.
Onslaught save.

5. Adding IP address filtering rules

Let's go to the point Filtering IP address, press the button Add.

We create the first rule that describes 3 permitted additions.

  • Working hour (Hour of the rules) from 00:00 00 hvilin, until 24 years 00 hvilin, tobto. whole lot
  • IP addresses in the LAN. It is possible to reserve the addresses of attachments to the white list, because I assigned the addresses that go in a row, I can specify the range 192.168.0.10 to 192.168.0.13 (actually up to 192.168.0.12 is needed, because there are only 3 extensions, Pardon on Picture 6)
  • Diya - Allow me.

Indications hour I I allow access for Specified IP address range.

Z 00 00 hwilin to 24 00 hvilin, attached with addresses 192.168.0.10, 192.168.0.11, 192.168.0.12, 192.168.0.13 - Router Allowed access to the Internet.

6. Adding rules for the "white list"

We create another rule, a rule that describes the settlement of (children's) buildings.

  • Working hours (Hour of the rules) from 07 years 00 hvilin, until 22 years 00 hvilin
  • IP addresses in the LAN. Not specified, tse means that the entire possible range of the address is victorious
  • Diya - Allow me.

A logically created rule is to sound: Indications hour I I allow access for all IP address.

Z 07 00 hwilin to 22 00 hvilin, whether I'll build it - a router. Allowed access to the Internet.

Image 7. Addition of the rules for the Internet hour for all outbuildings

We re-verify the correct creation of the rules, we correct the addresses of that hour of the exchange.

Logically, the router is reconsidering:

  1. Yakscho Be it an hour, a outbuildings addresses run away vid 192.168.0.10 to 192.168.0.12, then Permissible access, without pereviryayuchi following the rules
  2. If the addresses of the first item did not match with the “bіlim list”, then Permissible access, Be it for someone to build our merezhі just at once an hour from 7 wound to 10 pm, not overturning the next rule
  3. As it turned out, the attachments are not on the “white list” (point 1), but the daily hour from 22:00 to 7:00 am is blocking access to everyone.

8. Rechecking the correctness of the rules

I see, the most complicated part - the creation of rules - successfully vikonan!

Reloading the router to accept changes

To change the chivalry of ceremonies - the router is re-vantaged.

Selected section System tools, paragraph Rezavantage.

11. Restarting the router

The router is resetting, you can change the filtering rules to the robot (as the hour has come for you), so I recommend resetting (or reconnecting to the Internet) the add-on from the white list, so that the IP address and the router are updated, adding these add-ons reserved addresses for them.

How did this article help you and would you like to help the project site, share this article with others:

Batkiv control. Like a room for a child, access to the Internet in an hour.. Remaining changes: 2018-09-23 Yun Sergiy

The Internet is not safe for oneself, especially for the unimaginable minds of the growing generation. Ale, few people from fathers dare to protect their child from shkіdlvoї іnformatsiї by way of fence that mind. 90% of schoolchildren easily deceive their mother and continue to use unchild resources.

Vykoristannya Internet in inappropriate purposes "to sin" and grew up. Pardons of office practitioners are often blamed for 50% of the stench being taken not by right, but by social measures.

To solve the problem radically, only one problem helps - blocking non-essential resources. Read how to block a site from children and not-so-grown-ups in a very twisted way.

A way to block web resources through Hosts - a local database of IP-addresses and setting them domain names, re-insurance on the failures themselves. Since today young schoolchildren know about Hosts, it is not important for rich people to reset the balance and start your efforts. That's why you should get used to it by visiting some її zakhistu. For example:

  • Create for the koristuvach, for whom you can name us, close access to non-legal sites, oblique records with obmezhenimi rights. You can't fix anything on the Hosts file for all the trouble.
  • Tricks to pick up blocking records.

The blocking technology itself is quite simple:

  • Log in to Windows under the guise of an administrator.
  • Let's go to the folder %Windir%\System32\drivers\etc, we know the file without expansion with the name "Hosts" and it is necessary to help Notepad or a program that replaces it. So that there are no problems to save money, you can do it like this: run Windows Notepad (file notepad.exe, located in the Windows folder) with administrator rights, go to Hosts through the menu "File" - "Enter" and enter it into the program.
  • If there is a place for the file in a new row, add a record 127.0.0.1 site, de zamіst "site" prescribe the address of the resource that is blocked.

  • Save the file on the front space. So that the notepad does not attribute to you the txt extension, the hosts name, we write in paws, and all files are selected for the file type.

After this site ceases to appear in browsers, the computer shukatime yoga is not on the Internet, but on its own.

Cunning, yakі zavadat koristuvachevі see your record at Hosts

The first option is to attach the record itself to the file. It’s impossible to make it invisible, but between comments (rows that start with #) and it can insert 2-3 hundred empty rows. Koristuvach when you open the file, it’s better for everything, don’t brutally respect the smog of scrolling the document and don’t shake your record, so it will be far below.

Another option is to move the Hosts file to another, more quiet place. Where do you put it, write it yourself, ale, so that the yoga system did not waste, you have to make a small edit to the register. Open the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters and parameter values ​​in RegEdit DataBasePath write a new path to Hosts.

Through DNS

The traffic of a computer connected to the Internet must pass through DNS servers (like, like and hosts, set website names to their IP address). Okrim DNS, given by the provider, you can beat others, for example, free public.

Deyakі public CSN can filter the content filtering system, so as not to zavantazhuyut on the computer of the site with the song itself.

Unfortunately, it is not possible to block resources for your own choice for additional DNS, but if you want to block access to content for mature or potentially sloppy websites, the method is even more efficient. In order to speed it up, it is enough to register with the authorities the connection to the IPv4 version of the protocol and the need for DNS addresses.

At the same time, the application of vikoristani public DNS Yandex іz filter mature content.

Є th іnshі blocking options:

  • Yandex: 77.88.8.88 (main) and 77.88.8.2 (alternative) - filtering phishing and Shakhrai resources.
  • Norton ConnectSafe (Symantec): 198.153.192.40 (primary) and 198.153.194.40 (alternative) - filtering phishing, fraud, malware
  • Norton ConnectSafe: 198.153.192.50 and 198.153.194.50 - the same plus a content filter for adults.
  • Norton ConnectSafe: 198.153.192.60 and 198.153.194.60 - those are the same plus blocking whether it's "unchild" topics.

Browsers

Modern browsers retaliate against a lot of koris, but there are no functions of blocking sites on a variant of koristuvacha in most of them. Lost out, maybe, less than Internet Explorer.

In order to be able to block the site, your favorite browser has appeared, it is enough to install a special extension, for example, Block Site. If you send a message to the Chrome store, you can get such a plugin (navigate not one, but three similar names) for Google Chrome and Yandex Browser.


The principle of working with such extensions is even simpler. The stinks add a blocking function to the context menu. By right-clicking on the mouse for any kind of permission (including on the file attachment) and selecting the "Block" command, you will add the site to the black list. Moreover, I will do it, and I will not swear aside.

Deyaki z representations of the extensions allow you to populate the black list manually and create filters for blocking in place.

Plugins with functions for the block of web resources are available not only for Chrome, but also for Opera, Mozilla Firefox and other less popular browsers.

For the help of the Windows firewall or a third-party firewall

Windows Firewall may block websites for IP addresses only. This is not the best way, so that one IP can be divided between each other with a lot of resources, but great portals, such as VKontakte and Odnoklassniki, occupy a whole range of addresses. Third-party firewalls are more flexible - they allow you to block access to the single side. For whom it is sufficient to enter the URL in the program, and not the IP, which is more convenient for a koristuvach.

The shards of the skin firewall are set up in their own way, but we can’t look at them all, but the principle of setting up a universal feature is the Windows 10 firewall.

For the creation of the blocking rule, the IP site is significant. For whom it is handy to win a team ping_URL(for example, "ping ya.ru") or whois services.

  • Check out the firewall. In the left panel, select "Visual connection rules", and in the "Дії" list - "Create a rule".

  • In the offensive, it is significant "All programs" (as the site is guilty of blocking in all browsers) or "Ways of the program" (as in one). If you choose another option, you may choose a path to the browser file to be displayed.

  • Come on, let's miss it. After a new fault, please indicate the IP that is blocking. Significantly, in the lower part of the "Region" window, the item "Specify IP-addresses" and press "Add". The upper field is not clear, because it is recognized for the creation of rules for local borders.

  • We write down the IP address or the range of the website address and press the OK button.

  • Then select "Block connection".

  • It is significant to merezhevі profiles, for which we choose the best rule.

  • I remain short of the rule of im'ya.

After the onslaught of “Ready” the rule of ceremoniality.

On the router

Setting up access control on routers of different models is not the same, but their algorithm is rather similar. Let's figure out how to block access to unwanted sites on the TP-Link application.

TP-Link access control (and not less) works in black and white list mode. For the first time, access is allowed to any web resources, creme of significance. For the other, they are defended by everyone, krim, I know, nevertheless, they are appointed. It is looked at as an example of the creation of a black list, shards of wine are most often found.

  • We go into the admin panel, open “Access Control” and press “Master nalashtuvan”.

  • For the new window, select the IP address mode, specify the node name, for which rule you are creating, and specify the IP address or range address.

  • We then select the “Domain name” mode, write more name (for which the rule is being created) and re-fence the site.

  • At the next stage, we create a blocking layout.

  • Let's set the rules for them, review all the parameters and press "Complete".

  • The rest of the time - choose the filtering mode (in our case - block the packets from the assigned domains to pass through the router) and save the rules. Also, don't forget to set "Enable Internet access control management".

On whom the nailing is finished.

By means of the father's control

Batkivsky control today you can do it wherever you can. Vіn є at rich routers, anti-virus programs and navit at the operating systems themselves. Before the release of Windows 7, Batkivsky control was a complete system function. In Windows 10, having become "family security with updates through the Microsoft website," the essence of this has not changed. Fathers, as before, may be able to fence for yoga to help children access to border resources.

Vtim, scho mi all about Windows that Windows? Let's take a look at how Batkiv's control is practiced by Kaspersky Internet Security.

  • Nalashtuvannya obmezheny zdіysnyuєtsya through a special vision split.

  • The first thing you need to do after entering the new one is to set a password to enable the function and change it.
  • They gave you a list of oblique records of coristuvachs, for which you can win the Batkivsky control. To press a selected oblіkovogo record "Nakashtuvati obmezhennya".

  • Access to web content is established at the “Internet” branch. There are currently 2 blocking modes: sites for adults (black list) and all sites that are allowed (white list).

  • When choosing the blacklist mode, you can set a category for content that should be blocked, or without assigning specific sites. If the white list mode is selected, the site is allowed to be added to the vinatkiv. Reshta to block.

The item of notification/vimknennya control is found in the upper part of the veneer on the list of koristuvachiv.

For the help of static routes

Static (post_yny) route - only a few tasks for the passage of packages from one intermodal node to another. For example, from your computer to the server on which the website is hosted. Having registered in the Windows registry or in the settings of the router a pardon route to the Internet resource (to be more precise, its IP address), you can do it in such a way that the wine does not appear.

Yak tse vikonati:

  • Reach out for help ping_URL IP-addresses required by the site.
  • Without closing the command line (you may be running as admin), enter one more instruction: route -p add destination_site IP mask 255.255.255.0 192.168.1.0 metric 1.

Response "Ok" means that the route to the site 213.180.193.3 has been created. Now, on my computer ya.ru does not show up.

In the Windows registry, all static routes are located in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\PersistentRoutes.

To tidy up the record, which has become irrelevant, and restore access to the site, click on the record with the right button of the bear and select "View". Abo, click on the instruction in the command line route-f. Remaining way to see all current post routes. If you want to take more than one of them, select the team route delete node_target IP, for example, route delete 213.180.193.3. After that, the site ya.ru will become available again.

Three local IP security (IPSec) policies

The IP security policy (IPSec) switch for access to the Internet is a non-trivial method. It’s too little to know about the reason for such a possibility (on the Hosts view), and the one for whom you block this web resource, you can’t guess for sure, as you have been robbed.

For the help of IPSec, you can block both the okremy IP site and the pool address. The only drawback is that policy management is not in the current editions of Windows. So, at home releases, it’s out of the day.

The creation of an IP security policy can be folded, but it’s even better. After a few samples, it will not take more than 2-3 quills from you. Tim is more than a skin crocodile escort Meister.

  • Also, to access the snap-in, go to the menu bar and select "Administration", click "Local Security Policy" and select "IP Security Policies on Local PC".
  • Right-click the bear on the empty area of ​​the right half of the “Local Policies” window and select the item “Create an IP security policy”. The first Meister will start up.

  • At the vіknі, scho vіdkrylos farі, state the name of the new policy and briefly describe її recognition. You can leave these fields for promotions, or better yet, save them so that we don’t get lost later.

  • Press "Dali", do not change anything.

  • Finish Maistre's work by typing "Change power" and pressing "Done".

  • At the end of the authorities' future IPSec policy, press "Add". Tse to start the offensive Meister of the IP security rules.

  • At the "Kintseva Point of the Tunnel" show, fill it all up.

  • At the "Type of measure" section, select "All connections".

  • At the "List of IP filters" (you need to create them), click "Add". Give your list a name and press "Add" again. The third Meister - IP filters will start.

  • First of all, give the new filter a description (please enter the URL of the blocked site).

  • Enter "My IP addresses" to Jerell traffic.

  • Appointments - "Assignment of IP or submerezh". Below, write the address of the site that is being blocked, or else.

  • In the "Protocol type" section, mark "Whether it is".

  • With the rest of the crochet, press "Change the authorities" and "Done". Zovsim got a lot of money.

  • Confirm the parameters of the new filter.

  • If you want to create another one, click the Add button next to the next one. Otherwise, press "OK". Tse to launch the Wizard of installations of dіy filters.

  • At the "List of IP-filters" designate several creations and click "Dali".
  • Give me that description of what I'm working on (block the site).
  • In the parameters dії enter "Block".
  • The final stage of the stage is the change of authority and the completion of the work of the master.
  • Now I’m rewriting and confirming the adjustment.
  • The rest of the row is to create the safety rules. Tsim to take care of the fifth Meister.
  • After the completion of yoga work, I will change the authorities again and press "Done".
  • Reverse and confirm the parameters of the new rule.
  • I nasamkinets - all the powers of politics. It's created that it appears at the list of distribution.
  • It was too late to bring politics. Click on it with the right button of the bear and wrap "Assign".

At the “Vlastivosti” branch, you can change the parameters of the policy, and through the context menu - turn on, change and see.