- Categories
- Computers and Electronics
- Hacks
Download Article
Explore this Article
methods
1Disabling File and Printer Sharing
2Running a Malware Scan
3Using a Firewall
4Blocking Java
5Changing Your Router Settings
+Show 2 more...
-Show less...
Other Sections
Tips and Warnings
Related Articles
References
Co-authored byStan Katsand Nicole Levine, MFA
Last Updated: May 22, 2024References
Download Article
If you live amid a stream of Wi-Fi locations, you may be concerned about the potential of other computers being able to access your printer and files. The only way to guarantee that no other computers will be able to access yours is to completely disconnect it from the Internet. However, this wikiHow guide will help you protect your printer and files with a few workarounds, including downloading a Firewall and blocking sharing programs.
Method 1
Method 1 of 5:
Disabling File and Printer Sharing
Download Article
1
Stop sharing your printer with other users on the network. If you have a printer, you may unknowingly be sharing it with others. Fortunately, it's easy to disable printer sharing in your settings.
- Windows: In the Control Panel, click Network and Internet and then Network and Sharing Center. Click Change advanced sharing settings and then choose Turn off file and printer sharing.[1]
- macOS: Click the Apple menu and go to System Preferences… > Sharing. Remove the checkmark next to "Printer" to stop sharing your printer.[2]
2
Check your network file sharing settings. If your PC or Mac is set up to share files over the network, people who are connected to the same Wi-Fi or wired network as you may be able to access certain files on your computer. To disable file sharing:
- Windows: Turning off printer sharing in the Network and Sharing Center also turns off file sharing for Windows 10 and 11. But you can go a step further and make your PC undiscoverable—in Control Panel > Network and Internet > Network and Sharing Center, click Change advanced sharing settings, and then choose Turn off network discovery.[3]
- macOS: Click the Apple menu and go to System Preferences… > Sharing. Remove the checkmark from "File Sharing" to stop sharing all files, or check the list of users in "Users & Groups" to remove access for certain users only.[4]
Advertisem*nt
3
Turn off Nearby Sharing in Windows. If you're using Windows 10 or 11, there's a feature on your PC that lets you share files with other users nearby. If you don't want other people to be able to send files directly to your computer while nearby, you can disable Nearby Sharing:
- Windows 10: In the Windows menu, go to Settings > System > Shared experiences and select Off.[5]
- Windows 11: In the Windows menu, go to Settings > System > Nearby Sharing and choose Off.[6]
4
Turn off AirDrop on your Mac. When AirDrop is enabled on your Mac, other people can wirelessly send documents and other files to your computer when nearby. To disable AirDrop:
- Click the Control Center icon at the top-right corner of the screen (the two sliders).
- If the AirDrop icon is blue, click it to turn off AirDrop.[7]
Advertisem*nt
Method 2
Method 2 of 5:
Running a Malware Scan
Download Article
1
Choose your anti-malware program. There are dozens of programs you can choose from. Many are free, but if you’re willing to pay, you can get more advanced security. All of them can run a scan that detects a large majority of threats to your computer. The more advanced programs allow you to do a custom scan.
See AlsoSecurity for Portable and Desktop ComputersLock Your Desktop When You're AwayHow to Secure your Home ComputerCan you have 100% cybersecurity protection? - Naperville, Aurora, St. Charles | WEBIT Services- Whichever scanning program you choose, make sure it scans your registry objects. This is where you will first see problems with a hacker. Memory, startup, filesystem, and heuristic areas are also important in your scan.
2
Install your program. Some have system pre-requisites, be sure that you use one that matches with your computer and system model. The pre-requisites will be listed before you download or install anything. If your computer doesn’t recognize the program, you’ve likely chosen one that doesn’t match the pre-requisites.
- Find your program either by inserting the disk and navigating to your computer menu or by going into your downloads and double clicking on the program.
- Select language and read through the agreement. You must accept the terms to move forward.
- Select an installation directory. Clicking next after you accept the terms will automatically select your default locations for your installation directory.
- You’re ready to install. You will be asked if you’d like to create a desktop icon and then you’ll see a final confirmation asking if you’re ready to install. Once you confirm, your installation will be completed in the next couple minutes.
3
Run a threat scan. Open your anti-malware program. The home screen will have an option across the top that says “Scan.” Click this. Up to three scan options will pop up. Choose the first level, Threat Scan, for the most comprehensive scan. It scans all of the places that malware is known to hide.
4
Scan now. When you choose which scan you wish to run, a screen will pop up with all of your programs listed in a menu. Beneath this menu, there will be a button that says Scan Now. Click this button. This scan can take a good about of time to perform. You can watch your scan progress by keeping the program open.
- You can pause the scan at any time by clicking the button at the bottom of your progress screen.
5
Examine your scan results. If your computer has not been hacked, has no malware, and no other threats, your scan will display no detected threats. If there are threats, it will list them and you decide where to go from there.
- Most anti-malware programs will list the threats by severity. Red will represent malware, whereas yellow often represents items that are potential danger. Remove malware to protect your computer. It is up to you which programs to keep.
- Select the boxes that you wish to remove. The programs listed will be next to a box. Check them and then click “Remove Selected.”
- Once the removal is done, you’re scan will tell you that it was quarantined.
6
Restart your computer. To ensure that the threat removal process is complete, you need to restart your computer. If you choose to wait, you will be reminded regularly that you need to restart it.
Advertisem*nt
Method 3
Method 3 of 5:
Using a Firewall
Download Article
1
Use Windows firewall. A firewall is a network security system that monitors and controls incoming and outgoing network traffic. This helps screen out hackers, viruses, and worms that are trying to reach your computer over the Internet.[8] Windows has built firewall protection into the program since 2001. It was built to specifically protect your system from outside attacks.[9]
2
Add a third-party firewall. Because your built-in firewall only protects from outside attacks, you’ll want to download a third-party firewall.[10] This will help protect your computer from local programs that are abusing your network connection. There are many no-cost firewalls that will work on multiple PCs: Kerio Personal Firewall 2, Outpost Firewall Free, Sygate Personal Firewall 5.1, and Zone Labs’ ZoneAlarm 3.7 are four solid free firewalls.
- These can be found online simply by searching their names. The free download option is on the homepage for each of the programs.
3
Disallow networks to browse. Firewalls have a default setting. This setting allows other PCs on the same network to browse. However, they won’t be able to access your files and printers. You can enable this by right-clicking the firewall’s system tray icon.[11]
- Choose options, and then Network Neighborhood.
- Select the interface you use to connect in the drop-down list that appears.
- Uncheck the box next to “Allow others to share my files and printer(s)” and then click OK.
- Now your computer is safe from local and outside attacks.
Advertisem*nt
Method 4
Method 4 of 5:
Blocking Java
Download Article
1
Disable Java. This is a program that was originally created to help run programs with ease from any Java-supporting platform. Instead, it has turned into an attack vector for hackers.[12] Although some programs still use Java, if you don’t absolutely need it, disable it.
2
Open your control panel. From here, launch the Java app (it looks like a steaming coffee mug). When you open the app, it will have a similar set up to your settings menu—there will be tabs across the top. Choose the tab that’s labeled “Security.”
- Find the single check box. This will be titled “Enable Java content in the browser.”
- Un-check this box. Click OK. Now you’ve disabled Java.[13]
3
Keep Java in one browser. If you need Java for work or to run a certain program that you can’t live without, you can enable it in a single bowser. To do this, re-launch the Java app. There will be a tab on the top that says “Advanced.” Within this tab, you’ll see and item titled “Default Java for browsers.”
- A list of your browsers will appear when you click to expand “Default Java for browsers.” The list will have boxes next to them. Check the boxes next to a browser if you wish to run Java in that browser.
Advertisem*nt
Method 5
Method 5 of 5:
Changing Your Router Settings
Download Article
1
Change the security settings. This will help protect your computer by making it more difficult for hackers to access it through your Wi-Fi. Even if you have a password set up, this will further aid the protection of your computer.
- Keep your router up-to-date so it can protect you from known vulnerabilities.[14]
2
Find the “Wireless Security” page. This will be in your wireless settings, under the tab that says “Wireless Security.” Don’t choose the tab that says “Security,” that’s for other settings. If you don’t have a password, set one up here.
- Don’t make it a weak password. It should include non-dictionary words, special characters, and numbers.
- Write this password somewhere that you’ll remember it.
3
Change your security mode. There will be a dropdown menu next to “Security Mode.” Click this and scroll to WPA2 personal. This home security system is much more difficult than the standard security system to crack. (The standard is the WEP).[15]
Advertisem*nt
Expert Q&A
Search
Question
How can I keep other computers from accessing my computer?
Stan Kats
Professional TechnologistStan Kats is a Professional Technologist and the COO and Chief Technologist for The STG IT Consulting Group in West Hollywood, California. Stan provides comprehensive technology solutions to businesses through managed IT services, and for individuals through his consumer service business, Stan's Tech Garage. Stan holds a BA in International Relations from The University of Southern California. He began his career working in the Fortune 500 IT world. Stan founded his companies to offer an enterprise-level of expertise for small businesses and individuals.
Stan Kats
Professional Technologist
Expert Answer
Most firewalls out there will keep other computers from connecting to your computer. It depends on your WiFi connection, though.
Thanks! We're glad this was helpful.
Thank you for your feedback.
If wikiHow has helped you, please consider a small contribution to support us in helping more readers like you. We’re committed to providing the world with free how-to resources, and even $1 helps us in our mission.Support wikiHowYesNo
Not Helpful 0Helpful 0
Question
Will a firewall keep me safe on a public WiFi network?
Stan Kats
Professional TechnologistStan Kats is a Professional Technologist and the COO and Chief Technologist for The STG IT Consulting Group in West Hollywood, California. Stan provides comprehensive technology solutions to businesses through managed IT services, and for individuals through his consumer service business, Stan's Tech Garage. Stan holds a BA in International Relations from The University of Southern California. He began his career working in the Fortune 500 IT world. Stan founded his companies to offer an enterprise-level of expertise for small businesses and individuals.
Stan Kats
Professional Technologist
Expert Answer
It may put up a bit of a fight in certain situations, but public WiFi networks can be especially unsafe. I'd recommend using a VPN if you're on a public WiFi network to mask your computer.
Thanks! We're glad this was helpful.
Thank you for your feedback.
If wikiHow has helped you, please consider a small contribution to support us in helping more readers like you. We’re committed to providing the world with free how-to resources, and even $1 helps us in our mission.Support wikiHowYesNo
Not Helpful 0Helpful 0
Question
How can I keep my home network safe from hackers?
Stan Kats
Professional TechnologistStan Kats is a Professional Technologist and the COO and Chief Technologist for The STG IT Consulting Group in West Hollywood, California. Stan provides comprehensive technology solutions to businesses through managed IT services, and for individuals through his consumer service business, Stan's Tech Garage. Stan holds a BA in International Relations from The University of Southern California. He began his career working in the Fortune 500 IT world. Stan founded his companies to offer an enterprise-level of expertise for small businesses and individuals.
Stan Kats
Professional Technologist
Expert Answer
Keeping your router up to date will protect your home network from any vulnerabilities. You also want to keep your computer's operating system up to date for similar reasons.
Thanks! We're glad this was helpful.
Thank you for your feedback.
If wikiHow has helped you, please consider a small contribution to support us in helping more readers like you. We’re committed to providing the world with free how-to resources, and even $1 helps us in our mission.Support wikiHowYesNo
Not Helpful 0Helpful 0
Ask a Question
200 characters left
Include your email address to get a message when this question is answered.
Advertisem*nt
Tips
Submit a Tip
All tip submissions are carefully reviewed before being published
Name
Please provide your name and last initial
Submit
Thanks for submitting a tip for review!
Warnings
By allowing Java to run in a single browser, your computer is still at risk.
Thanks
Helpful0Not Helpful0
Keep your network secure—don't connect to unknown WiFi networks, and make sure you use a strong password for your home WiFi network.[16]
Thanks
Helpful0Not Helpful0
Advertisem*nt
You Might Also Like
Advertisem*nt
References
- ↑ https://support.microsoft.com/en-us/windows/file-sharing-over-a-network-in-windows-b58704b2-f53a-4b82-7bc1-80f9994725bf
- ↑ https://support.apple.com/lt-lt/guide/mac-help/mchlp2424/mac
- ↑ https://support.microsoft.com/en-us/windows/file-sharing-over-a-network-in-windows-b58704b2-f53a-4b82-7bc1-80f9994725bf
- ↑ https://support.apple.com/guide/mac-help/set-up-file-sharing-on-mac-mh17131/mac
- ↑ https://support.microsoft.com/en-us/windows/share-things-with-nearby-devices-in-windows-0efbfe40-e3e2-581b-13f4-1a0e9936c2d9#WindowsVersion=Windows_10
- ↑ https://support.microsoft.com/en-us/windows/share-things-with-nearby-devices-in-windows-0efbfe40-e3e2-581b-13f4-1a0e9936c2d9
- ↑ https://support.apple.com/guide/mac-help/airdrop-mac-send-files-devices-mh35868/mac
- ↑ Stan Kats. Cybersecurity Expert. Expert Interview. 24 June 2021.
- ↑ https://support.microsoft.com/en-us/windows/turn-microsoft-defender-firewall-on-or-off-ec0844f7-aebd-0583-67fe-601ecf5d774f
More References (7)
- ↑ https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
- ↑ https://support.microsoft.com/en-us/topic/disable-file-and-printer-sharing-for-additional-security-3713fb7e-7c34-e60a-01f4-20f34ba38154
- ↑ https://www.java.com/download/help/disable_browser.html
- ↑ https://www.java.com/download/help/disable_browser.html
- ↑ Stan Kats. Cybersecurity Expert. Expert Interview. 24 June 2021.
- ↑ https://www.wi-fi.org/discover-wi-fi/security
- ↑ Stan Kats. Cybersecurity Expert. Expert Interview. 24 June 2021.
About This Article
Co-authored by:
Stan Kats
Professional Technologist
This article was co-authored by Stan Kats and by wikiHow staff writer, Nicole Levine, MFA. Stan Kats is a Professional Technologist and the COO and Chief Technologist for The STG IT Consulting Group in West Hollywood, California. Stan provides comprehensive technology solutions to businesses through managed IT services, and for individuals through his consumer service business, Stan's Tech Garage. Stan holds a BA in International Relations from The University of Southern California. He began his career working in the Fortune 500 IT world. Stan founded his companies to offer an enterprise-level of expertise for small businesses and individuals. This article has been viewed 60,928 times.
How helpful is this?
Co-authors: 14
Updated: May 22, 2024
Views:60,928
Categories: Hacks
In other languages
- Send fan mail to authors
Thanks to all authors for creating a page that has been read 60,928 times.
Is this article up to date?
Advertisem*nt