


Broadband Internet users are especially vulnerable because their computers are constantly connected to the Internet. That increases the chances that hackers will locate them and try to exploit any available vulnerability.Occasionally, however, you’ll want another computer to interact with your computer over the Internet.
You may be playing a multiplayer game, for example, or using a file-sharing program. To stop the firewall from blocking those programs, add their names to the firewall’s Exceptions list by following these steps.