When computers are used as single isolated systems protocols
aren’t needed as there is no need of communication here. But in case of systems
connected together in a network, Protocols are necessary. Protocols are certain
set of variables and fields that dictates communication in networks of
computers. Without protocols in networking, it’s just like sending a letter
without writing an address and posting it at the nearby grocery shop. There are
several types of protocols like ICMP, TCP/IP, FTP, etc. Each protocol has their
purpose. While IMAP and POP are mainly used in mail retrieval by mailboxes like
outlook, TCP/IP, ICMP, etc. are basic system network protocols. Tech support is
provided by many forums and professionals for smooth usage of these protocols.
ICMP or Internet
Control Message Protocol is the core protocol in Computers. ICMP is numbered 1
in the protocol list or for the ease of speech “ICMP is the first protocol”.
ICMP is a protocol used in sending status messages to other computers. Unlike
TCP/IP, FTP etc. there is no data transfer by this protocol. However it can be used in relaying query
messages from one user node or host to another. This protocol, under normal
circumstances, is not employed by the end user network applications with the
exception of ping and tracer. Ping and Tracer are some basic network tools used
by professionals (Hackers also) in checking network parameters and
connectivity.
Although a very useful protocol, ICMP is very much stained
due to its vulnerabilities. ICMP has the behavior of sending signal to any user
who has send a ping request. Ping is a network tool (uses ICMP) that sends a
packet of data to selected IP addresses. The active PC’s that receive the
packet of signal send the signal back if ICMP is active. You may be thinking
“So, What the heck?” The thing is Ping and Tracer and some network tools based
on their characteristics are hackers favorite. This tool informs hacker that
whether your system is active or not.
“Don’t worry; I can
help you disable it”
First of all you don’t need any professional Tech support. Your
system should installed with SP2 or greater. Go to Control Panel from Start
Menu. Now, click on Windows Firewall or Security Center. Now ON the Windows
Firewall if its OFF. Now open advanced settings. Now uncheck the box near ICMP
section.
Just
do the above and your system doesn’t have active ICMP.