5 Ways to Block Other Computers from Being Able to Access Your Computer's Printer And Files Over the Internet (2024)

  • Categories
  • Computers and Electronics
  • Hacks

Download Article

Explore this Article

methods

1Disabling File and Printer Sharing

2Running a Malware Scan

3Using a Firewall

4Blocking Java

5Changing Your Router Settings

+Show 2 more...

-Show less...

Other Sections

Tips and Warnings

Related Articles

References

Co-authored byStan Katsand Nicole Levine, MFA

Last Updated: May 22, 2024References

Download Article

If you live amid a stream of Wi-Fi locations, you may be concerned about the potential of other computers being able to access your printer and files. The only way to guarantee that no other computers will be able to access yours is to completely disconnect it from the Internet. However, this wikiHow guide will help you protect your printer and files with a few workarounds, including downloading a Firewall and blocking sharing programs.

Method 1

Method 1 of 5:

Disabling File and Printer Sharing

Download Article

  1. 1

    Stop sharing your printer with other users on the network. If you have a printer, you may unknowingly be sharing it with others. Fortunately, it's easy to disable printer sharing in your settings.

    • Windows: In the Control Panel, click Network and Internet and then Network and Sharing Center. Click Change advanced sharing settings and then choose Turn off file and printer sharing.[1]
    • macOS: Click the Apple menu and go to System Preferences… > Sharing. Remove the checkmark next to "Printer" to stop sharing your printer.[2]
  2. 2

    Check your network file sharing settings. If your PC or Mac is set up to share files over the network, people who are connected to the same Wi-Fi or wired network as you may be able to access certain files on your computer. To disable file sharing:

    • Windows: Turning off printer sharing in the Network and Sharing Center also turns off file sharing for Windows 10 and 11. But you can go a step further and make your PC undiscoverable—in Control Panel > Network and Internet > Network and Sharing Center, click Change advanced sharing settings, and then choose Turn off network discovery.[3]
    • macOS: Click the Apple menu and go to System Preferences… > Sharing. Remove the checkmark from "File Sharing" to stop sharing all files, or check the list of users in "Users & Groups" to remove access for certain users only.[4]

    Advertisem*nt

  3. 3

    Turn off Nearby Sharing in Windows. If you're using Windows 10 or 11, there's a feature on your PC that lets you share files with other users nearby. If you don't want other people to be able to send files directly to your computer while nearby, you can disable Nearby Sharing:

    • Windows 10: In the Windows menu, go to Settings > System > Shared experiences and select Off.[5]
    • Windows 11: In the Windows menu, go to Settings > System > Nearby Sharing and choose Off.[6]
  4. 4

    Turn off AirDrop on your Mac. When AirDrop is enabled on your Mac, other people can wirelessly send documents and other files to your computer when nearby. To disable AirDrop:

    • Click the Control Center icon at the top-right corner of the screen (the two sliders).
    • If the AirDrop icon is blue, click it to turn off AirDrop.[7]
  5. Advertisem*nt

Method 2

Method 2 of 5:

Running a Malware Scan

Download Article

  1. 1

    Choose your anti-malware program. There are dozens of programs you can choose from. Many are free, but if you’re willing to pay, you can get more advanced security. All of them can run a scan that detects a large majority of threats to your computer. The more advanced programs allow you to do a custom scan.

    • Whichever scanning program you choose, make sure it scans your registry objects. This is where you will first see problems with a hacker. Memory, startup, filesystem, and heuristic areas are also important in your scan.
  2. 2

    Install your program. Some have system pre-requisites, be sure that you use one that matches with your computer and system model. The pre-requisites will be listed before you download or install anything. If your computer doesn’t recognize the program, you’ve likely chosen one that doesn’t match the pre-requisites.

    • Find your program either by inserting the disk and navigating to your computer menu or by going into your downloads and double clicking on the program.
    • Select language and read through the agreement. You must accept the terms to move forward.
    • Select an installation directory. Clicking next after you accept the terms will automatically select your default locations for your installation directory.
    • You’re ready to install. You will be asked if you’d like to create a desktop icon and then you’ll see a final confirmation asking if you’re ready to install. Once you confirm, your installation will be completed in the next couple minutes.
  3. 3

    Run a threat scan. Open your anti-malware program. The home screen will have an option across the top that says “Scan.” Click this. Up to three scan options will pop up. Choose the first level, Threat Scan, for the most comprehensive scan. It scans all of the places that malware is known to hide.

  4. 4

    Scan now. When you choose which scan you wish to run, a screen will pop up with all of your programs listed in a menu. Beneath this menu, there will be a button that says Scan Now. Click this button. This scan can take a good about of time to perform. You can watch your scan progress by keeping the program open.

    • You can pause the scan at any time by clicking the button at the bottom of your progress screen.
  5. 5

    Examine your scan results. If your computer has not been hacked, has no malware, and no other threats, your scan will display no detected threats. If there are threats, it will list them and you decide where to go from there.

    • Most anti-malware programs will list the threats by severity. Red will represent malware, whereas yellow often represents items that are potential danger. Remove malware to protect your computer. It is up to you which programs to keep.
    • Select the boxes that you wish to remove. The programs listed will be next to a box. Check them and then click “Remove Selected.”
    • Once the removal is done, you’re scan will tell you that it was quarantined.
  6. 6

    Restart your computer. To ensure that the threat removal process is complete, you need to restart your computer. If you choose to wait, you will be reminded regularly that you need to restart it.

  7. Advertisem*nt

Method 3

Method 3 of 5:

Using a Firewall

Download Article

  1. 1

    Use Windows firewall. A firewall is a network security system that monitors and controls incoming and outgoing network traffic. This helps screen out hackers, viruses, and worms that are trying to reach your computer over the Internet.[8] Windows has built firewall protection into the program since 2001. It was built to specifically protect your system from outside attacks.[9]

  2. 2

    Add a third-party firewall. Because your built-in firewall only protects from outside attacks, you’ll want to download a third-party firewall.[10] This will help protect your computer from local programs that are abusing your network connection. There are many no-cost firewalls that will work on multiple PCs: Kerio Personal Firewall 2, Outpost Firewall Free, Sygate Personal Firewall 5.1, and Zone Labs’ ZoneAlarm 3.7 are four solid free firewalls.

    • These can be found online simply by searching their names. The free download option is on the homepage for each of the programs.
  3. 3

    Disallow networks to browse. Firewalls have a default setting. This setting allows other PCs on the same network to browse. However, they won’t be able to access your files and printers. You can enable this by right-clicking the firewall’s system tray icon.[11]

    • Choose options, and then Network Neighborhood.
    • Select the interface you use to connect in the drop-down list that appears.
    • Uncheck the box next to “Allow others to share my files and printer(s)” and then click OK.
    • Now your computer is safe from local and outside attacks.
  4. Advertisem*nt

Method 4

Method 4 of 5:

Blocking Java

Download Article

  1. 1

    Disable Java. This is a program that was originally created to help run programs with ease from any Java-supporting platform. Instead, it has turned into an attack vector for hackers.[12] Although some programs still use Java, if you don’t absolutely need it, disable it.

  2. 2

    Open your control panel. From here, launch the Java app (it looks like a steaming coffee mug). When you open the app, it will have a similar set up to your settings menu—there will be tabs across the top. Choose the tab that’s labeled “Security.”

    • Find the single check box. This will be titled “Enable Java content in the browser.”
    • Un-check this box. Click OK. Now you’ve disabled Java.[13]
  3. 3

    Keep Java in one browser. If you need Java for work or to run a certain program that you can’t live without, you can enable it in a single bowser. To do this, re-launch the Java app. There will be a tab on the top that says “Advanced.” Within this tab, you’ll see and item titled “Default Java for browsers.”

    • A list of your browsers will appear when you click to expand “Default Java for browsers.” The list will have boxes next to them. Check the boxes next to a browser if you wish to run Java in that browser.
  4. Advertisem*nt

Method 5

Method 5 of 5:

Changing Your Router Settings

Download Article

  1. 1

    Change the security settings. This will help protect your computer by making it more difficult for hackers to access it through your Wi-Fi. Even if you have a password set up, this will further aid the protection of your computer.

    • Keep your router up-to-date so it can protect you from known vulnerabilities.[14]
  2. 2

    Find the “Wireless Security” page. This will be in your wireless settings, under the tab that says “Wireless Security.” Don’t choose the tab that says “Security,” that’s for other settings. If you don’t have a password, set one up here.

    • Don’t make it a weak password. It should include non-dictionary words, special characters, and numbers.
    • Write this password somewhere that you’ll remember it.
  3. 3

    Change your security mode. There will be a dropdown menu next to “Security Mode.” Click this and scroll to WPA2 personal. This home security system is much more difficult than the standard security system to crack. (The standard is the WEP).[15]

  4. Advertisem*nt

Expert Q&A

Search

Add New Question

  • Question

    How can I keep other computers from accessing my computer?

    Stan Kats
    Professional Technologist

    Stan Kats is a Professional Technologist and the COO and Chief Technologist for The STG IT Consulting Group in West Hollywood, California. Stan provides comprehensive technology solutions to businesses through managed IT services, and for individuals through his consumer service business, Stan's Tech Garage. Stan holds a BA in International Relations from The University of Southern California. He began his career working in the Fortune 500 IT world. Stan founded his companies to offer an enterprise-level of expertise for small businesses and individuals.

    Stan Kats

    Professional Technologist

    Expert Answer

    Most firewalls out there will keep other computers from connecting to your computer. It depends on your WiFi connection, though.

    Thanks! We're glad this was helpful.
    Thank you for your feedback.
    If wikiHow has helped you, please consider a small contribution to support us in helping more readers like you. We’re committed to providing the world with free how-to resources, and even $1 helps us in our mission.Support wikiHow

    YesNo

    Not Helpful 0Helpful 0

  • Question

    Will a firewall keep me safe on a public WiFi network?

    Stan Kats
    Professional Technologist

    Stan Kats is a Professional Technologist and the COO and Chief Technologist for The STG IT Consulting Group in West Hollywood, California. Stan provides comprehensive technology solutions to businesses through managed IT services, and for individuals through his consumer service business, Stan's Tech Garage. Stan holds a BA in International Relations from The University of Southern California. He began his career working in the Fortune 500 IT world. Stan founded his companies to offer an enterprise-level of expertise for small businesses and individuals.

    Stan Kats

    Professional Technologist

    Expert Answer

    It may put up a bit of a fight in certain situations, but public WiFi networks can be especially unsafe. I'd recommend using a VPN if you're on a public WiFi network to mask your computer.

    Thanks! We're glad this was helpful.
    Thank you for your feedback.
    If wikiHow has helped you, please consider a small contribution to support us in helping more readers like you. We’re committed to providing the world with free how-to resources, and even $1 helps us in our mission.Support wikiHow

    YesNo

    Not Helpful 0Helpful 0

  • Question

    How can I keep my home network safe from hackers?

    Stan Kats
    Professional Technologist

    Stan Kats is a Professional Technologist and the COO and Chief Technologist for The STG IT Consulting Group in West Hollywood, California. Stan provides comprehensive technology solutions to businesses through managed IT services, and for individuals through his consumer service business, Stan's Tech Garage. Stan holds a BA in International Relations from The University of Southern California. He began his career working in the Fortune 500 IT world. Stan founded his companies to offer an enterprise-level of expertise for small businesses and individuals.

    Stan Kats

    Professional Technologist

    Expert Answer

    Keeping your router up to date will protect your home network from any vulnerabilities. You also want to keep your computer's operating system up to date for similar reasons.

    Thanks! We're glad this was helpful.
    Thank you for your feedback.
    If wikiHow has helped you, please consider a small contribution to support us in helping more readers like you. We’re committed to providing the world with free how-to resources, and even $1 helps us in our mission.Support wikiHow

    YesNo

    Not Helpful 0Helpful 0

Ask a Question

200 characters left

Include your email address to get a message when this question is answered.

Submit

      Advertisem*nt

      Tips

      Submit a Tip

      All tip submissions are carefully reviewed before being published

      Name

      Please provide your name and last initial

      Submit

      Thanks for submitting a tip for review!

      Warnings

      • By allowing Java to run in a single browser, your computer is still at risk.

        Thanks

        Helpful0Not Helpful0

      • Keep your network secure—don't connect to unknown WiFi networks, and make sure you use a strong password for your home WiFi network.[16]

        Thanks

        Helpful0Not Helpful0

      Advertisem*nt

      You Might Also Like

      The Ultimate Guide to Hacking for BeginnersHow toReset a BIOS Password
      How to Stream PS5 to Discord: Remote Play, Capture Card, or Voice ChatHow to Hack Screen Time: 12 Easy Workarounds to Try How to Use Cheat EngineHow to Find Out a Password: 8 Tricks to Gain Access to AccountsHow toHack GmailHow toCrash Your Computer Using a Batch FileHow toHack a PlayStation PortableHow toHack GamesA Simple Guide to Creating a QR Code to Your Google FormHow to Hack LanSchoolHow toHack Into a School ComputerHow toHack a Website with Basic HTML Coding

      Advertisem*nt

      References

      1. https://support.microsoft.com/en-us/windows/file-sharing-over-a-network-in-windows-b58704b2-f53a-4b82-7bc1-80f9994725bf
      2. https://support.apple.com/lt-lt/guide/mac-help/mchlp2424/mac
      3. https://support.microsoft.com/en-us/windows/file-sharing-over-a-network-in-windows-b58704b2-f53a-4b82-7bc1-80f9994725bf
      4. https://support.apple.com/guide/mac-help/set-up-file-sharing-on-mac-mh17131/mac
      5. https://support.microsoft.com/en-us/windows/share-things-with-nearby-devices-in-windows-0efbfe40-e3e2-581b-13f4-1a0e9936c2d9#WindowsVersion=Windows_10
      6. https://support.microsoft.com/en-us/windows/share-things-with-nearby-devices-in-windows-0efbfe40-e3e2-581b-13f4-1a0e9936c2d9
      7. https://support.apple.com/guide/mac-help/airdrop-mac-send-files-devices-mh35868/mac
      8. Stan Kats. Cybersecurity Expert. Expert Interview. 24 June 2021.
      9. https://support.microsoft.com/en-us/windows/turn-microsoft-defender-firewall-on-or-off-ec0844f7-aebd-0583-67fe-601ecf5d774f

      More References (7)

      About This Article

      5 Ways to Block Other Computers from Being Able to Access Your Computer's Printer And Files Over the Internet (47)

      Co-authored by:

      Stan Kats

      Professional Technologist

      This article was co-authored by Stan Kats and by wikiHow staff writer, Nicole Levine, MFA. Stan Kats is a Professional Technologist and the COO and Chief Technologist for The STG IT Consulting Group in West Hollywood, California. Stan provides comprehensive technology solutions to businesses through managed IT services, and for individuals through his consumer service business, Stan's Tech Garage. Stan holds a BA in International Relations from The University of Southern California. He began his career working in the Fortune 500 IT world. Stan founded his companies to offer an enterprise-level of expertise for small businesses and individuals. This article has been viewed 60,928 times.

      How helpful is this?

      Co-authors: 14

      Updated: May 22, 2024

      Views:60,928

      Categories: Hacks

      In other languages

      • Print
      • Send fan mail to authors

      Thanks to all authors for creating a page that has been read 60,928 times.

      Is this article up to date?

      Advertisem*nt

      5 Ways to Block Other Computers from Being Able to Access Your Computer's Printer And Files Over the Internet (2024)
      Top Articles
      Artificial Intelligence (AI) Stocks Trading Under $5
      How To Spot The Red Flags Of Crypto Money Laundering
      Leora From Real Life Cam
      Masori Chaps Ge Tracker
      Ciara Rose Scalia-Hirschman
      124 Indian Pointe, Unit 124, Osage Beach, MO 65065 | Compass
      Jaheira, Friend of the Forest
      KMS ver. 1.2.369 – Tactical Relay & Super Haste!
      War Thunder M60
      Clinical Psychology in Arkansas
      48 Hours Season 35 Episodes
      Www Cortrustbankcc.com
      Gia Divine - Songs, Concert tickets & Videos
      Boyfriend (2018) | KDrama Recaps on Dramabeans
      Craigslistbatonrouge
      Freightliner Cascadia d'occasion à vendre | tracteur routier
      selena gomez en ropa interior
      Udk Raid
      BWW Interview: Marilu Henner Talks THE MARILU HENNER SHOW, Her Highly Superior Autobiographical Memory & More!
      Understanding The Payment Structure Behind Online Slot Machines
      Contact | Claio
      Best Zoroark Build Unite
      Fake Snaps Summer
      R/Sellingsunset
      Clafi Arab
      Modesto Rainfall 2022
      Consuming Dark Poe
      Guardians Of The Galaxy Holiday Special Putlocker
      Iran Yellow Pages Serial
      Cocaine Bear Showtimes Near Amc Dine-In Fashion District 8
      Grown Ups - TV Tropes
      Weve Got You Surrounded Meme
      1Bitch1Puppies
      Black Adam Showtimes Near Marcus Valley Grand Cinema
      Hca Florida Middleburg Emergency Reviews
      Eversource Outage Map Cape Cod
      Florida surgeon general favorably recommended after Democrats walk out of confirmation hearing | CNN Politics
      Bailu Game8
      Halloween showing of Hocus Pocus on Thirsks Outdoor cinema, Station Road,Thirsk,YO7 1QL,GB, Northallerton, 11 October 2024
      LUVSQUAD Discord Server
      Sam's Club Gas Price Mechanicsburg Pa
      Ats Service Plays
      Persona 4 Golden Taotie Fusion Calculator
      Www.socialserve.com Ga
      Steamunlocked Starfield
      July Accuweather
      Xsport Fitness Schedule
      Netid.unm.edu
      Hmh Zip Code Locator
      Digital Marketing Agency | Marketing Mix from 4Ps: 8Ps and The Difference Between Them | Blogs | Marketing House
      Linkedin.comnk
      Half Sleeve Hood Forearm Tattoos
      Latest Posts
      Article information

      Author: Madonna Wisozk

      Last Updated:

      Views: 5837

      Rating: 4.8 / 5 (68 voted)

      Reviews: 83% of readers found this page helpful

      Author information

      Name: Madonna Wisozk

      Birthday: 2001-02-23

      Address: 656 Gerhold Summit, Sidneyberg, FL 78179-2512

      Phone: +6742282696652

      Job: Customer Banking Liaison

      Hobby: Flower arranging, Yo-yoing, Tai chi, Rowing, Macrame, Urban exploration, Knife making

      Introduction: My name is Madonna Wisozk, I am a attractive, healthy, thoughtful, faithful, open, vivacious, zany person who loves writing and wants to share my knowledge and understanding with you.