Firewalls watch network requests, open or near ports on the computer. They can be basically the first echelon in the defense procedure. Structure and apply a firewall software. At the least try out a thing like netstat that also has permissions to shut ports or alert on suspicious community requests. https://pay-someone-to-take-progr47500.csublogs.com/34274692/not-known-facts-about-pay-someone-to-take-programming-homework