Dismiss Notice
You are browsing this site as a guest. It takes 2 minutes to CREATE AN ACCOUNT and less than 1 minute to LOGIN

VIRTUALl DJ 7 PRO

Discussion in 'Tech, Gadgets & Science Forum' started by Adolph, Aug 3, 2011.

  1. Adolph

    Adolph JF-Expert Member

    #1
    Aug 3, 2011
    Joined: Sep 26, 2010
    Messages: 845
    Likes Received: 24
    Trophy Points: 35
    wakuu nimedownload virtual dj pro 7 kwa kutumia torrent bt daaah installation yake imenishinda...imeniambia nifuate steps zifuatazo but imekua ngumu kidogo..

    INSTRUCTIONS

    1. Install the programme as normal, once completed DO NOT RUN

    2. Open windows firewall and goto the advanced tab

    3. Create a inbound rule, point it to virtual dj, and block it from accessing the internet.

    4. Create a outbound rule, point it to virtual dj and block it from accessing the internet.

    5. Close windows firewall and run Virtual DJ, If you get a protection warning error and
    the programme quits, you have not completed step 3 & 4 correctly.

    step ya 3 na 4 nimeshindwa kama kuna mtu anaweza akanielewesha nitashukuru.....pamoja wazee
     
  2. Brakelyn

    Brakelyn JF-Expert Member

    #2
    Aug 3, 2011
    Joined: Oct 6, 2009
    Messages: 1,200
    Likes Received: 24
    Trophy Points: 135
    nadhani unatakiwa uizuie virtual DJ kwa Firewall, hakikisha hivyo vibox kwenye home/work na public havipo marked..mfano kwenye hii picha

    Untitled.jpg
     
  3. Adolph

    Adolph JF-Expert Member

    #3
    Aug 3, 2011
    Joined: Sep 26, 2010
    Messages: 845
    Likes Received: 24
    Trophy Points: 35
    thanks hembu ngoja nijaribu@brakelyn
     
  4. Brakelyn

    Brakelyn JF-Expert Member

    #4
    Aug 3, 2011
    Joined: Oct 6, 2009
    Messages: 1,200
    Likes Received: 24
    Trophy Points: 135
    mkuu hivyo kumbe lazima uchague network mojawapo, ni hivi kutengeneza inbound rule..

    Administrative credentials
    To complete these procedures, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs.

    To create an inbound firewall rule for a program or service
    • Open the Group Policy Management Console to Windows Firewall with Advanced Security.
    • In the navigation pane, click Inbound Rules.
    • Click Action, and then click New rule.
    • On the Rule Type page of the New Inbound Rule Wizard, click Custom, and then click Next.
      [TABLE]
      [TR]
      [/TR]
      [TR]
      [TD="bgcolor: #F7F7FF"]Although you can create rules by selecting Program or Port, those choices limit the number of pages presented by the wizard. If you selectCustom, you see all of the pages, and have the most flexibility in creating your rules.[/TD]
      [/TR]
      [/TABLE]
    • On the Program page, click This program path.
    • Type the path to the program in the text box. Use environment variables, where applicable, to ensure that programs installed in different locations on different computers work correctly.
    • Do one of the following:
      • If the executable file contains a single program, click Next.
      • If the executable file is a container for multiple services that must all be allowed to receive inbound network traffic, click Customize, select Apply to services only, click OK, and then click Next.
      • If the executable file is a container for a single service or contains multiple services but the rule only applies to one of them, click Customize, selectApply to this service, and then select the service from the list. If the service does not appear in the list, click Apply to service with this service short name, and then type the short name for the service in the text box. Click OK, and then click Next.
      [TABLE]
      [TR]
      [/TR]
      [TR]
      [TD="bgcolor: #F7F7FF"]To use the Apply to this service or Apply to service with this service short name options, the service must be configured with a security identifier (SID) with a type of RESTRICTED or UNRESTRICTED. To check the SID type of a service, run the following command:sc qsidtype <ServiceName>If the result is NONE, then a firewall rule cannot be applied to that service.To set a SID type on a service, run the following command:sc sidtype <Type> <ServiceName>In the preceding command, the value of <Type> can be UNRESTRICTED or RESTRICTED. Although the command also permits the value of NONE, that setting means the service cannot be used in a firewall rule as described here. By default, most services in Windows are configured asUNRESTRICTED. If you change the SID type to RESTRICTED, the service might fail to start. We recommend that you change the SID type only on services that you want to use in firewall rules, and that you change the SID type to UNRESTRICTED. For more information, see Vista Services(Services in Windows) and the "Service Security Improvements" section of Inside the Windows Vista Kernel(Inside the Windows Vista Kernel).[/TD]
      [/TR]
      [/TABLE]
    • It is a best practice to restrict the firewall rule for the program to only the ports it needs to operate. On the Protocols and Ports page, you can specify the port numbers for the allowed traffic. If the program tries to listen on a port different from the one specified here, it is blocked. For more information about protocol and port options, see Create an Inbound Port Rule on Windows 7, Windows Vista, Windows Server 2008, or Windows Server 2008 R2. After you have configured the protocol and port options, click Next.
    • On the Scope page, you can specify that the rule applies only to network traffic to or from the IP addresses entered on this page. Configure as appropriate for your design, and then click Next.
    • On the Action page, select Allow the connection, and then click Next.
    • On the Profile page, select the network location types to which this rule applies, and then click Next.
      [TABLE]
      [TR]
      [/TR]
      [TR]
      [TD="bgcolor: #F7F7FF"]If this GPO is targeted at server computers running Windows Server 2008 that never move, consider applying the rule to all network location type profiles. This prevents an unexpected change in the applied rules if the network location type changes due to the installation of a new network card or the disconnection of an existing network card's cable. A disconnected network card is automatically assigned to the Public network location type.[/TD]
      [/TR]
      [/TABLE]
    • On the Name page, type a name and description for your rule, and then click Finish.
     
Loading...