"Root Kit" <b__nice@hotmail.com> wrote in message
news:tsge645qsn674u3slk7e6ac5u4gi1uv4it@4ax.com...<span style="color:blue">
> On Sat, 28 Jun 2008 21:04:35 +0100, "~BD~" <BoaterDave@nospam.invalid>
> wrote:
><span style="color:green">
>>
>>"Root Kit" <b__nice@hotmail.com> wrote in message
>>news
guc64d1g17d55iik4qgq28upb6664560n@4ax.com...<span style="color:darkred">
>>> On Sat, 28 Jun 2008 08:46:01 -0700, Dan
>>> <Dan@discussions.microsoft.com> wrote:
>>>
>>>>You are most welcome. I do like grc.com that you can use with Internet
>>>>Explorer to see if you have any ports that are not hidden on the first
>>>>1000+
>>>>ports by doing a scan.
>>>
>>> If by hidden you mean "stealth", how do you (with the help of
>>> mentioned tool) distinguish between a port which is filtered (or
>>> "stealthed") and a port occupied by a malware waiting for instructions
>>> on a UDP port?
>>></span>
>>
>>I personally have no idea, John (I call people I don't know by that name;
>>surprisingly, about 70% of the time it turns out to be correct! <g>
</span>
>
> Maybe it's because you can't. If you didn't deal with this foolish
> "stealth" security theater, you would. What you want is to avoid
> unnecessary open ports. Whether they are otherwise closed or
> "stealthed" makes no difference in terms of security. "Stealth" only
> makes you feel better.
><span style="color:green">
>>I've used the grc.com site on many occasions (as have several million
>>others!)</span>
>
> Since when did volume say anything about quality?</span>
OK - you win! style_emoticons/
<span style="color:blue">
>
> ShieldsUp is mainly a promotion tool. SU is good for one thing and one
> thing only: To quickly check if some kind of packet filter is in place
> either on your machine or somewhere upstream. That's it. Nothing more.
><span style="color:green">
>>If you are aware of any other programme which can carry out a
>>similar safety check, perhaps you'll let us know Root Kit (John!). TIA</span>
>
> Well, how about first of all checking your listening sockets on the
> machine itself by using something as simple as the cmd netstat?</span>
I'd never come across this before ............ I've found
http://technet.microsoft.com/en-gb/library...echNet.10).aspx and
will explore further IDC. Thanx.
- Or<span style="color:blue">
> for a more graphic experience use "TCPview" from MS-sysinternals</span>
I found this:-
http://technet.microsoft.com/en-us/sysinte...s/bb897437.aspx
and have downloaded same. I've had a quick look, but will study later. Many
thanks. style_emoticons/
or my<span style="color:blue">
> personal favorite "CurrPorts" from NirSoft.</span>
I found it here:
http://www.nirsoft.net/utils/cports.html Again, I've had
a quick look, but will study later. Many thanks. style_emoticons/
<span style="color:blue">
>
> These will tell you all you need to know about what services are
> listening on what ports. For best security, you should have only the
> ones absolutely necesaary. If you then want to check from the outside
> to see if those are available or filtered, at least use an nmap-based
> service like the one available at
>
http://www.linux-sec.net/Audit/nmap.test.gwif.html</span>
I've had a quick look. Never seen it before! Lots to investigate. Thank you
once more! style_emoticons/
<span style="color:blue">
>
> And always remember that if you connect through some kind of gateway
> (e.g. a router), that's the one being examined and not your machine
> itself.
></span>
I do use a router ............... and connect wirelessly.
There's a lot to learn about 'computing' - when I started to learn they had
thermionic valves and the transistor was in its infancy! How things have
changed!
I really appreciate your guidance, John. (That's Root Kit, aka Straight
Talk, I believe!)
Thank you.
BD