Strengthen WiFree protection: הבדלים בין גרסאות בדף

מתוך ויקי נטפרי
קפיצה לניווט קפיצה לחיפוש
(יצירת דף עם התוכן "{{{En|חיזוק הגנת WiFree}} {{Navigation|WiFree Software}} The WiFree software is originally intended to be an obstacle to the random opening of non filt...")
 
 
(6 גרסאות ביניים של 5 משתמשים אינן מוצגות)
שורה 1: שורה 1:
{{{En|חיזוק הגנת WiFree}}
+
{{he|חיזוק הגנת WiFree}}
 
{{Navigation|WiFree Software}}
 
{{Navigation|WiFree Software}}
  
The WiFree software is originally intended to be an obstacle to the random opening of non filtered internet, whether due to a malfunction or due to temporary exposure to non filtered WiFi network in travel or else.
+
The WiFree software is originally intended to be an obstacle to the random opening of non-filtered internet, whether due to a malfunction or due to temporary exposure to non filtered WiFi network in travel or else.
  
 
There are simple steps that can protect your computer more hermetically, which is required if you want to make sure the computer should not be a obstacle for youngster.
 
There are simple steps that can protect your computer more hermetically, which is required if you want to make sure the computer should not be a obstacle for youngster.
שורה 8: שורה 8:
 
The risk exists with the following factors:
 
The risk exists with the following factors:
  
#'''Availabily of non filtered Internet''' - Either there is at home reception for non filtered Internet, or the computer user may have an unfiltered SIM, or an antenna that can receive an other network.
+
#'''Availabily of non-filtered Internet''' - Either there is at home reception for non-filtered Internet, or the computer user may have an unfiltered SIM, or an antenna that can receive another network.
#Time and will, or professional knowledge.
+
#Time and desire, or professional knowledge.
  
 
The steps to toughen the protection against these cases are divided into two: operating system-level protection, and computer-level protection.
 
The steps to toughen the protection against these cases are divided into two: operating system-level protection, and computer-level protection.
שורה 22: שורה 22:
  
 
A non-admin user often poses a hassle for the user as he cannot install software, however this is a basic requirement in case of the above risks.
 
A non-admin user often poses a hassle for the user as he cannot install software, however this is a basic requirement in case of the above risks.
 +
 +
A non-administrator user is often a tirade for the user as he cannot install software, however this is a basic requirement in the case of the above risks.
  
 
==Computer-level protection==
 
==Computer-level protection==
This is more advanced, and is ment to counter boot the computer with an external system on a removable drive.
+
This is more advanced, and is meant to counter booting the computer with an external system on a removable drive.
The operation may be complicated for an average user, and a technician should be assisted if necessary (if you are a technical person in general you can use forums to get help to do these).
+
The operation may be complicated for the average user, and a technician should be assisted if necessary (If you are a technical person in general you can use forums to get help to do these or follow the instructions below).
  
 
Required steps:
 
Required steps:
 +
(Note this is only for ADVANCED users.)
 +
#Enter the BIOS settings upon startup (or restart - sometimes easier) of the computer.  (Usually by pressing F12 or as directed on startup.)
 +
#Set a difficult  password  for the BIOS.
 +
#Prevent booting from a removable disk or optical disk.
 +
#Disable virtualisation technologies (VT-x/AMD-V).
 +
#Leave and save changes.
  
#Setting a difficult  password  for the BIOS.
+
On a Desktop computer, these steps can be bypassed by physically accessing the BIOS reset component that is present in the computer case. You must ensure that there is no risk of opening the computer case screws.
#Prevent boot from a removable disk or optical disk.
 
 
 
On a Desktop computer, these steps can be bypassed by physically accessing the BIOS reset component that is present in the computer case.You must ensure the risk of opening the computer case screws.
 

גרסה אחרונה מ־08:28, 22 בספטמבר 2024

לעברית לחצו כאן

To switch from edit view to read view

To search in the Wiki

Home page > WiFree Software > Strengthen WiFree protection ‎‎


The WiFree software is originally intended to be an obstacle to the random opening of non-filtered internet, whether due to a malfunction or due to temporary exposure to non filtered WiFi network in travel or else.

There are simple steps that can protect your computer more hermetically, which is required if you want to make sure the computer should not be a obstacle for youngster.

The risk exists with the following factors:

  1. Availabily of non-filtered Internet - Either there is at home reception for non-filtered Internet, or the computer user may have an unfiltered SIM, or an antenna that can receive another network.
  2. Time and desire, or professional knowledge.

The steps to toughen the protection against these cases are divided into two: operating system-level protection, and computer-level protection.

OS-level protection

This is a basic operation that does not require special knowledge, and is very much needed in the above cases. This action comes against WiFree removal / disabling / tampering.

Operating system protection is done by the following steps:

  1. Setting a difficult password for the computer admin user
  2. Creating a "standard" user for anyone who needs access to the computer .

A non-admin user often poses a hassle for the user as he cannot install software, however this is a basic requirement in case of the above risks.

A non-administrator user is often a tirade for the user as he cannot install software, however this is a basic requirement in the case of the above risks.

Computer-level protection

This is more advanced, and is meant to counter booting the computer with an external system on a removable drive. The operation may be complicated for the average user, and a technician should be assisted if necessary (If you are a technical person in general you can use forums to get help to do these or follow the instructions below).

Required steps: (Note this is only for ADVANCED users.)

  1. Enter the BIOS settings upon startup (or restart - sometimes easier) of the computer. (Usually by pressing F12 or as directed on startup.)
  2. Set a difficult password for the BIOS.
  3. Prevent booting from a removable disk or optical disk.
  4. Disable virtualisation technologies (VT-x/AMD-V).
  5. Leave and save changes.

On a Desktop computer, these steps can be bypassed by physically accessing the BIOS reset component that is present in the computer case. You must ensure that there is no risk of opening the computer case screws.