REQ Azureus Tutorial like the uTorrent tutorial by pandlouk

Hi,

Like the topic says, I am looking for a tutorial for Azureus like the one for uTorrent done by pandlouk.

Thanks!

I never needed to use that tutorial. I simply port forwarded my modem and made uTorrent trusted after running the stealth port wizard with the P2P option.

Hi,

Well I did need to use that tutorial, and it was incredibly helpful. :slight_smile:

Now that I am switching to Azureus I need an in depth tutorial for it like the one for uTorrent.

I am sure there are many, many others like me who are in the same boat, or have been, or will be.

Cheers!

Very easily done. For the firewall go to Firewall/Advanced/Network Security Policy and right click on any entry and edit it. For D+ go to D+/Advanced/Computer Security Policy and right click on any entry and edit it. Comodo is the most power firewall out there and does not need any tweaking. If your talking about about ZA free thats a joke. ZA free is no better then Windows firewall and provides absolutely no protection. ZAP is another thing though. But you have to fork over $40 for a program that still cant compete with Comodo. You dont need to edit anything. You can make Firefox a web browser under then predefined options.

If somebody has gone back to ZA free then they are to afraid to learn how to use Comodo. Comodo is more then a firewall with its HIPS. I don’t use specific rules cause I am behind a hardware firewall. I don’t need a software firewall but I use it for outbound control. Once again ZA free cannot touch Comodo. Its doesnt even rate in Matousec cause it does so bad.

I am not a modder if you didn’t notice. I don’t need specific rules cause I know and trust all my programs. Most are games and my Avira. Why would I need so many rules. I know every program on my pc. I started using Comodo back with 2.4. I downloaded and installed some screen saver and afterwards Comodo was giving my tons of alerts about outgoing connections. Well a screen saver doesn’t need outbound permission so I blocked it. Then it kept happening and each time I blocked it. So I did a virus scan and spyware scan and got rid of the infection. Comodo did its job and alerted me. This is why till this day I will always be a Comodo user.

Well why don’t you make a thread about it since this isn’t the right thread to talk about it. Why don’t you use custom mode for the firewall and paranoid mode for D+. You can also set your alert settings to very high. BTW stop with all this ZA stuff. ZA will never be able to compare to the power of Comodo.

Hi John,

What I would like to know, is how I should Edit and tighten-up the security on the Automatically Generated Rules for each of my applications...

Examples for MSN, Skype, Firefox, Windows Live Mail, WinAMP, WinRAR, Dream Weaver, Flash Player, WMP 11, VLC. The list is endless.

The key phrase in the above quote is “The list is endless”.

Where do we start?
More importantly, where do the poor volunteers creating these tutorials end?

To tighten up the automatically created rules isn’t really that hard, and expert status isn’t a pre-requisite (a very basic understanding of TCP/IP and ports in handy, though ;)). The only thing you really need to know beforehand is what ports and protocols does the application in question use, and this information can generally be googled.

For example, to make a custom rule for Firefox, we need to know that web browsers use TCP protocol and contact servers on either port 80, 443 or 8080 (8080 is the most common proxy port but this could vary).

To use the above info in creating a custom rule for Firefox;

  1. Open the firewall and click FIREWALL - ADVANCED - NETWORK SECURITY POLICY
  2. Ensure that the APPLICATION RULES tab is selected
  3. Click the ADD button
  4. Use the SELECT button to choose the app you want to make the custom rule for (e.g. - Firefox)
  5. Ensure that “Use a custom policy is selected”
  6. Click the ADD button to add the specific rules - details as follows;

GENERAL
Action : ALLOW
Protocol : TCP
Direction : OUT
Description : Whatever you want to call the rule
SOURCE ADDRESS
Any (In an outbound rule like this one, the source address can be nothing else but you)
DESTINATION ADDRESS
Any (This allows access to all site)
SOURCE PORT
Any (Your request will be using a “randomly” chosen port number above 1056 that we have no control over)
DESTINATION PORT
A Set of Ports - use the droplist and select “HTTP Ports”, which is defined as ports 80, 443 and 8080

  1. Click APPLY to accept these rule parameters
  2. Click APPLY again to finalise the rule
  3. Your new custom rule will now appear in the Application Rules list

The above custom rule will only allow Firefox to access an external address on port 80, 443 or 8080, and only using the TCP protocol.

While this one rule only took me about 15 minuters to type up and double check, multiply this by “endless” and you’ll hopefully get some idea of the scope of what you’re asking.

I thought you guys were "Experts"?

99% of the people on these forums are just everyday users like you and I - even the mods are mortal. Being the source of all knowledge (or “expert”, if you will) isn’t a prerequisite to being a mod. The primary purpose of a moderator is to moderate, after all.

There are a large number of very, very knowledgeable people scattered throughout these forums, but, as voluntary members of this community, their time is their own and they give as they see fit.

Hopefully the above example is clear enough to start you on the relatively short road to rules creation. Who knows, maybe we’ll see your tutorials soon.

Cheers,
Ewen :slight_smile:

Go to Miscellaneous/ Manage My Configuration and export your settings.

Hi John,

Remember that any existing rules for Firefox will need to be deleted, if you are going to test the above rules in isolation.

Then break each Rule one by one; to see how it affects the program, to make sure each Rule 'DOES' affect the program, and to make sure the program (Firefox) runs as smoothly as it usually does

LOL. When you break the rules, it may not smoothly at all. If you set these rules up and test FF, it should run as it always does. When you remove this rule, leaving FF as an app with no rules, what happens next is determined by other settings within CFP, primarily the Defense+ and Firewall security level settings. This will determine whether it treats FF as a safe app or an as yet unknown app, and this will, in turn, determine what level of alerts you get and what level of detail is within those alerts.

Cheers,
Ewen :slight_smile:

I usually just used the predefined rules from the drop down selection. Right click on any program and select edit. Then click predefined rules and chose which one you want to use.

Hi again John,

Tight auto-generated rules can indeed be created by CFP.

Open CFP and click FIREWALL → ADVANCED → FIREWALL BEHAVIOUR SETTINGS → ALERT SETTINGS. Change the slider to VERY HIGH and the generated rules will then be as explicit as it is possible to be - direction, protocol, IP address and ports are explicitly nominated.

Once you’re a bit more comfortable with the software, go digging. There’s a mountain of configurability in this baby.

Cheers,
Ewen :slight_smile:

I told you the same thing in reply #11 about setting alerts to high.

P.S. Setting it to VERY HIGH will drive you nuts in no time, as it will generate separate rules for EACH and EVERY address your browser goes to. This, in turn, will grow the application rule list very quickly.:wink:

Ease up - vettetech was trying to help.

:wink:

Ewen :slight_smile:

Vettetech did all the hard work, I just chipped in at the end.

NP with the aggression. It can be very hard to write so it is interpreted exactly the way you intend, as it is bloody hard to convey “tone” in just words.

Cheers,
Ewen :slight_smile:

AAAAAAwwwwwwwwwwww thanks. (R) (CLY)