Re: hacker wanted

From: Paco (paco@seznam.cz)
Date: 05. 07. 2002, 20:06 CEST


> zaujima ma, ako optimalne chranit pocitac s trvalym
> pripojenim na net. Bezny pocitac, ziadne citlive data,
> neda sa ocakavat, ze by ho niekto hladal "cielene".
> ...
> Treba fireval? Ak ano staci trebars ZoneAlarm? Je s
> firewalom ZA pocitac zabezpeceny, alebo nie? (interny
> firewal z winXP chrani len prichadzajuce data, tusim,
> ze je to malo. alebo neni?)

Zkus si nejdriv vyzkouset svoje zabezpeceni na sajtu
Shields UP! na adrese

https://grc.com/x/ne.dll?bh0bkyd2

Trvale pripojeni, pevna IP, koupeny ZoneAlarm Pro 2.6
pracuje k naproste spokojenosti a od listopadu 2001
vidim v logu vic nez 300 pokusu zvenku, ktere vypadaji
podezrele (NetBIOS, vysoka cisla portu, etc.). Celkem
je za tu dobu blokovanych pristupu zvenku pres 4000,
jsou to ale vetsinou bezne veci (ICMP a pod.).
Smerem ven taky naprosto spolehlive blokuje aplikace,
ktere tam nemaji co strkat nos.

Shora zmineny Shields UP! moje stity ohodnotil jako
zcela neprustrelne, coz je pry 'na Win system velmi
neobvykle'. :) Krome zde uvedeneho jeste prozkousi
porty, ktere u mne shledal vsechny jako stealth...

pako Paco. 

-- Attempting connection to your computer... 
Shields UP! is now attempting to contact the Hidden
Internet Server within your PC. It is likely that no
one has told you that your own personal computer may
now be functioning as an Internet Server with neither
your knowledge nor your permission. And that it may
be serving up all or many of your personal files for
reading, writing, modification and even deletion by
anyone, anywhere, on the Internet! 

-- Your Internet port 139 does not appear to exist!
One or more ports on this system are operating in
FULL STEALTH MODE! Standard Internet behavior requires
port connection attempts to be answered with a success
or refusal response. Therefore, only an attempt to
connect to a nonexistent computer results in no
response of either kind. But YOUR computer has
DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!)
which represents advanced computer and port stealthing
capabilities. A machine configured in this fashion is
well hardened to Internet NetBIOS attack and intrusion.

-- Unable to connect with NetBIOS to your computer.
All attempts to get any information from your computer
have FAILED. (This is very uncommon for a Windows
networking-based PC.) Relative to vulnerabilities from
Windows networking, this computer appears to be VERY
SECURE since it is NOT exposing ANY of its internal
NetBIOS networking protocol over the Internet. 


______________________________________________________________________
Reklama:
Kam do kina ci divadla? http://kultura.seznam.cz



This archive was generated by hypermail 2.1.2 : 05. 07. 2002, 20:06 CEST