Firewalls monitor network requests, open or near ports on the computer. They're mainly the very first echelon from the defense system. Design and put into action a firewall software. At least try out something like netstat that also has permissions to shut ports or inform on suspicious network requests. Students https://programminghelponline65957.jts-blog.com/27663036/about-programming-project-help