Thursday, October 18, 2012

ICMP: A Note on This Useful yet Tainted Protocol


When computers are used as single isolated systems protocols aren’t needed as there is no need of communication here. But in case of systems connected together in a network, Protocols are necessary. Protocols are certain set of variables and fields that dictates communication in networks of computers. Without protocols in networking, it’s just like sending a letter without writing an address and posting it at the nearby grocery shop. There are several types of protocols like ICMP, TCP/IP, FTP, etc. Each protocol has their purpose. While IMAP and POP are mainly used in mail retrieval by mailboxes like outlook, TCP/IP, ICMP, etc. are basic system network protocols. Tech support is provided by many forums and professionals for smooth usage of these protocols.
 ICMP or Internet Control Message Protocol is the core protocol in Computers. ICMP is numbered 1 in the protocol list or for the ease of speech “ICMP is the first protocol”. ICMP is a protocol used in sending status messages to other computers. Unlike TCP/IP, FTP etc. there is no data transfer by this protocol.  However it can be used in relaying query messages from one user node or host to another. This protocol, under normal circumstances, is not employed by the end user network applications with the exception of ping and tracer. Ping and Tracer are some basic network tools used by professionals (Hackers also) in checking network parameters and connectivity.
Although a very useful protocol, ICMP is very much stained due to its vulnerabilities. ICMP has the behavior of sending signal to any user who has send a ping request. Ping is a network tool (uses ICMP) that sends a packet of data to selected IP addresses. The active PC’s that receive the packet of signal send the signal back if ICMP is active. You may be thinking “So, What the heck?” The thing is Ping and Tracer and some network tools based on their characteristics are hackers favorite. This tool informs hacker that whether your system is active or not.
“Don’t worry; I can help you disable it”
First of all you don’t need any professional Tech support. Your system should installed with SP2 or greater. Go to Control Panel from Start Menu. Now, click on Windows Firewall or Security Center. Now ON the Windows Firewall if its OFF. Now open advanced settings. Now uncheck the box near ICMP section.
Just do the above and your system doesn’t have active ICMP.