Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice.
Test #2Determine the status of your
system's first 1056 ports
This Internet service ports "grid scan" determines the status — Open, Closed, or Stealth — of your system's first 1056 TCP ports.
32 ports, represented by each horizontal row, are probed as a group. The results are posted as the next set of ports are probed.
During off-peak hours the entire scan requires just over one minute.
For guaranteed accuracy, the scanning time will increase during peak usage when many people are sharing our scanning bandwidth.
A scan of a stealthed system is up to four times slower since many more probes must be sent to guarantee against Internet packet loss.
The test may be abandoned at any time if you do not wish to wait for the scan to finish.
You may hover your mouse cursor over any grid cell to determine which port it represents, or click on the cell to jump to the corresponding Port Authority database page to learn about the port's specific role, history, and security consequences. (Depress SHIFT when clicking to open new window and allow unfinished test to continue.)
Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice.
I came across this a month ago. It is free, and has all the settings to allow or deny or ask your permission for every single network connection;logs of activity,list of all programs on your computer - it won't even let anything make an update connection without my permission - that you can set or modify any time.
Most importantly, I get several attacks every hour (connection attempts) that get blocked and a simple alert notifies when this happens. All ports, for instance:
- Incoming connection blocked 23410:
Hewlet Packard HP-UX Portable File System Buffer Overflow Vulnerability - Incoming connection blocked 49360:
The Dynamic and/or Private Ports are those from 49152 through 65535 - Incoming connection blocked 38434:
# 38204-39680 Unassigned
Funny, I got a box running Linux on this network.
In any event: http://www.netveda.com/downloads/index.htm
No comments:
Post a Comment