Since there are 40 pages of people totally able to understand this guide, you should probably search the problem by yourself
And please dont Fullquote a post with this length... >.<
You may look in my signature, there is a guide for this exploit with a program (called Peerblock) instead of the firewall... it's essentially the same, just a little more comfortable IMO