dslreports logo

    All Forums Hot Topics Gallery


how-to block ads

prev page · 1 · 2

Las Vegas, NV

Stealth -

Just to post this message to cover the whole noted posts that I have read, although it would seem that I came late in all this,

Now days if you are in a static location you need to have
a firewall, Hardware would be prefered,

on alost every IDSL,ADSL and SDSL product no mater who the telco is, you can see all inbound UDP/TCP trafcif and the results will be scary, China Korea newzeland ond my list can go on and on, its alomost as though they are perpusly probing all internet traffic. My advice Go Stealth no ICMP
TCP or UDP should be visable other then services you intend to offer.

Cypress, CA
·Time Warner Cable

Thanks for the linkage

It's been years since I've visited:www.grc.com/
Thanks for reminding me about a very useful site.

Attempting connection to your computer. . .
Shields UP! is now attempting to contact the Hidden Internet Server within your PC. It is likely that no one has told you that your own personal computer may now be functioning as an Internet Server with neither your knowledge nor your permission. And that it may be serving up all or many of your personal files for reading, writing, modification and even deletion by anyone, anywhere, on the Internet!
Your Internet port 139 does not appear to exist!
One or more ports on this system are operating in FULL STEALTH MODE! Standard Internet behavior requires port connection attempts to be answered with a success or refusal response. Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!) which represents advanced computer and port stealthing capabilities. A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion.
Unable to connect with NetBIOS to your computer.
All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet.
prev page · 1 · 2