Antivirus, Application security, Authentication, backdoors, Biometrics, Current threats, cybersecurity, Data breach, Data-security, Digital certificates, Disaster recovery planning, Encryption, filtering, Firewall, Firewalls, Forensics, Hacking, Identity & Access Management, Identity management, Incident response, Information security, Intrusion management, ISA Server, IT security, malware, McAfee, Microsoft patches, Microsoft Security, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security Program Management, Security tokens, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Veritas, Viruses, vulnerability management, Web security, Windows Security, worms VIEW ALL TAGS
I want to config a router to deny any use for TCP port 80. How can I do that?
I have a home network which is hooked up to a Cox DSL Router. The Cox DSL Router is then plugged into a Linksys Wireless Router by CAT5. Running off of the Linksys Router is a CAT5 going into 1 desktop in the same room. I also have a desktop (main computer) that connects via Belkin Wireless. Now,...