Just install it by default. After the installation is completed, ask students to fill in your ip address and port 1080 in the proxy server.
Protocol selection socket 5
You can also use: 80, because the default port number of web browsing service is 80, so you only need to enter the URL, and you don't need to enter ":80". Port vulnerability: Some Trojans can use port 80 to attack computers, such as executing utor and RingZero. Operation suggestion: In order to surf the Internet normally, port 80 must be opened. 109 and1/0 port description: 109 port is open for post office protocol 2 (post office protocol version 2) service, 1 10 port is open for POP3 (mail protocol 3) service, and POP2 and POP3 are mainly used for receiving. The client can access the mail service of the server using POP3 protocol, which is now used by most mail servers of ISP. When using the e-mail client program, you will be asked to enter the POP3 server address. By default, the port 1 10 is used (as shown). Port vulnerabilities: POP2 and POP3 have many vulnerabilities while providing mail receiving services. There are no fewer than 20 vulnerabilities in the user name and password exchange buffer of POP3 service alone, such as the vulnerability of legal user name information disclosure of WebEasyMail POP3 server, through which remote attackers can verify the existence of user accounts. In addition, the 1 10 port is also used by Trojans such as ProMail, and the user name and password of the POP account can be stolen through the 1 10 port. Operation suggestion: If it is an execution mail server, you can open this port. 135 port description: 135 port is mainly used to provide DCOM (Distributed Component Object Model) service by using RPC (Remote Procedure Call) protocol. Through RPC, a program running on a computer can successfully execute code on a remote computer. Using DCOM, we can communicate directly through the network and transmit across various networks including HTTP protocol. Port vulnerability: I believe that many Windows 2000 and Windows XP users were infected with the "Shockwave" virus last year, which used RPC vulnerabilities to attack computers. There are loopholes in RPC itself when dealing with message exchange through TCP/IP, which is caused by improper handling of messages with incorrect format. This vulnerability will affect the interface between RPC and DCOM, which listens on port 135. Operation suggestion: In order to avoid the attack of "shock wave" virus, it is recommended to close the port 137. Description: Port 137 is mainly used for "NetBIOS name service" and belongs to UDP port. Users only need to send a request to the port 137 of a computer on the local area network or the Internet to get its name and registered user name. Port vulnerability: Because it is a UDP port, it is easy for an attacker to obtain the information of the target computer by sending a request, and some information can be directly used to analyze vulnerabilities, such as IIS services. In addition, by capturing the data packets being communicated through port 137, the startup and shutdown times of the target computer can be obtained, so that special tools can be used to attack. Operation suggestion: It is recommended to close this port. 139 port description: 139 port is provided for "NetBIOS session service", which is mainly used to provide Windows files and printers * * * and Samba service in Unix. In Windows, you must use this service to enjoy files on the LAN. For example, in Windows 98, you can open the Control Panel, double-click the Network icon, click the File and Print * * * button in the Configuration tab and select the corresponding settings to install and enable the service; In Windows 2000/XP, you can open the "Control Panel" and double-click the "Network Connection" icon to open the local connection properties; Next, select Internet Protocol (TCP/IP) in the general tab of the property window, and click the property button; Then in the window that opens, click the Advanced button; Select the WINS tab in the advanced TCP/IP settings window and enable NetBIOS over TCP/IP in the NetBIOS settings area. Port vulnerability: Although the open port 139 can provide * * * access service, it is often used by attackers to attack. For example, using port scanning tools such as Streamer and SuperScan, you can scan the port 139 of the target computer. If you find a loophole, you can try to get a user name and password, which is very dangerous.
(4): To open the port manually, please follow the following steps:
1. Click Start, and then click My Network Places.
2. Under Network Tasks, click View Network Connections. (Alternatively, right-click My Network Places on the desktop, and then click Properties. )
3. Right-click the Internet connection, and then click Properties.
Click the Advanced tab, and then click Settings.
Note: If the Settings button is not available, it means that Windows Firewall is not enabled on this connection, and you don't need to open any ports (because they are all open).
5. Click Add to open a new port.
6. In the Description box, type a name that is easy to remember. For example, type 1080: port 1080.
7. Type 127.0.0. 1 in the "Name or IP address of the computer on the network" box.
Note: You can specify the IP address of the internal computer. But usually, please use 127.0.0. 1.
8. In the External Port and Internal Port boxes, type the port number. Usually, this number is the same.
Click TCP or UDP and then click OK.
10. Repeat steps 1 to 9 for each port to be opened.