Prev: Microsoft Office Live Beta
Next: Avira AntiVir
From: Bear Bottoms on 30 Aug 2006 19:12 On Wed, 30 Aug 2006 13:08:18 -0500, Allan Higdon <alhigdon(a)mailinator.com> wrote: > On Tue, 29 Aug 2006 16:18:45 -0500, Bear Bottoms <bearbottoms1(a)cox.net> > wrote: > >> On Tue, 29 Aug 2006 03:06:02 -0500, Sir Psycho >> <totalharmonicdistortion(a)hotmail.com> wrote: >> >>> Hi there, >>> >>> Now that Kerio Personal Firewall has gotten all bloated up im looking >>> for an alternative. >>> >>> One of its handy fetaures was that it told you what program wanted to >>> connect out, what protocol it used, what port and allowed you to create >>> rules based on these connections. >>> >>> Has anyone found something similar thats lightweight? >>> >>> Thank you all >>> >> >> Ashampoo...it's the best right now. http://bearbottoms1.com >> > > I tried it out myself. > When I used the ShieldsUp site (Common Ports), the ports were mostly > Closed, with a few actually Open. > No Stealth at all. > A post from "Justme" on 8/24 mentioned the same result. > > > I just ran the shields up and leak test again and am completely stealth. Leak test 1.x failed. I'm not sure what you are talking about and now am suspect. -- I research freeware http://bearbottoms1.com
From: Bear Bottoms on 30 Aug 2006 20:55 On Wed, 30 Aug 2006 13:08:18 -0500, Allan Higdon <alhigdon(a)mailinator.com> wrote: > On Tue, 29 Aug 2006 16:18:45 -0500, Bear Bottoms <bearbottoms1(a)cox.net> > wrote: > >> On Tue, 29 Aug 2006 03:06:02 -0500, Sir Psycho >> <totalharmonicdistortion(a)hotmail.com> wrote: >> >>> Hi there, >>> >>> Now that Kerio Personal Firewall has gotten all bloated up im looking >>> for an alternative. >>> >>> One of its handy fetaures was that it told you what program wanted to >>> connect out, what protocol it used, what port and allowed you to create >>> rules based on these connections. >>> >>> Has anyone found something similar thats lightweight? >>> >>> Thank you all >>> >> >> Ashampoo...it's the best right now. http://bearbottoms1.com >> > > I tried it out myself. > When I used the ShieldsUp site (Common Ports), the ports were mostly > Closed, with a few actually Open. > No Stealth at all. > A post from "Justme" on 8/24 mentioned the same result. > I'm running the test again now: File sharing: Attempting connection to your computer. . . Shields UP! is now attempting to contact the Hidden Internet Server within your PC. It is likely that no one has told you that your own personal computer may now be functioning as an Internet Server with neither your knowledge nor your permission. And that it may be serving up all or many of your personal files for reading, writing, modification and even deletion by anyone, anywhere, on the Internet! Your Internet port 139 does not appear to exist! One or more ports on this system are operating in FULL STEALTH MODE! Standard Internet behavior requires port connection attempts to be answered with a success or refusal response. Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!) which represents advanced computer and port stealthing capabilities. A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion. Unable to connect with NetBIOS to your computer. All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet. Common Ports: all ports are stealth All Service Ports: True Stealth Analysis: all ports are stealth Messenger Spam: No return Browser header: Opera...we know the answer...great. It completely passed the Shields up test as stealth. Now for the LEAK TEST (specific firewall test) "drum roll": leak test 1.x unable to connect. So it passed all of the tests...what are you talking about???? -- I research freeware http://bearbottoms1.com
From: Sauron on 30 Aug 2006 21:19 Bear Bottoms schreef: > On Wed, 30 Aug 2006 13:08:18 -0500, Allan Higdon > <alhigdon(a)mailinator.com> wrote: > >> On Tue, 29 Aug 2006 16:18:45 -0500, Bear Bottoms >> <bearbottoms1(a)cox.net> wrote: >> >>> On Tue, 29 Aug 2006 03:06:02 -0500, Sir Psycho >>> <totalharmonicdistortion(a)hotmail.com> wrote: >>> >>>> Hi there, >>>> >>>> Now that Kerio Personal Firewall has gotten all bloated up im looking >>>> for an alternative. >>>> >>>> One of its handy fetaures was that it told you what program wanted to >>>> connect out, what protocol it used, what port and allowed you to create >>>> rules based on these connections. >>>> >>>> Has anyone found something similar thats lightweight? >>>> >>>> Thank you all >>>> >>> >>> Ashampoo...it's the best right now. http://bearbottoms1.com >>> >> >> I tried it out myself. >> When I used the ShieldsUp site (Common Ports), the ports were mostly >> Closed, with a few actually Open. >> No Stealth at all. >> A post from "Justme" on 8/24 mentioned the same result. >> > I'm running the test again now: > > File sharing: > Attempting connection to your computer. . . > Shields UP! is now attempting to contact the Hidden Internet Server > within your PC. It is likely that no one has told you that your own > personal computer may now be functioning as an Internet Server with > neither your knowledge nor your permission. And that it may be serving > up all or many of your personal files for reading, writing, modification > and even deletion by anyone, anywhere, on the Internet! > > Your Internet port 139 does not appear to exist! > One or more ports on this system are operating in FULL STEALTH MODE! > Standard Internet behavior requires port connection attempts to be > answered with a success or refusal response. Therefore, only an attempt > to connect to a nonexistent computer results in no response of either > kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's > very cool!) which represents advanced computer and port stealthing > capabilities. A machine configured in this fashion is well hardened to > Internet NetBIOS attack and intrusion. > > Unable to connect with NetBIOS to your computer. > All attempts to get any information from your computer have FAILED. > (This is very uncommon for a Windows networking-based PC.) Relative to > vulnerabilities from Windows networking, this computer appears to be > VERY SECURE since it is NOT exposing ANY of its internal NetBIOS > networking protocol over the Internet. > > Common Ports: all ports are stealth > > All Service Ports: True Stealth Analysis: all ports are stealth > > Messenger Spam: No return Browser header: Opera...we know the > answer...great. > > It completely passed the Shields up test as stealth. > > Now for the LEAK TEST (specific firewall test) "drum roll": leak test > 1.x unable to connect. > > So it passed all of the tests...what are you talking about???? > > > > > --I research freeware http://bearbottoms1.com I think he might refer to this : Ping Reply: RECEIVED (FAILED) — Your system REPLIED to our Ping (ICMP Echo) requests, making it visible on the Internet. Most personal firewalls can be configured to block, drop, and ignore such ping requests in order to better hide systems from hackers. This is highly recommended since "Ping" is among the oldest and most common methods used to locate systems prior to further exploitation. Run the test and this is the only thing that makes the test say True stealth analysis failed. -- A lawyer is a person who writes a 10,000 words documents and calls it a "brief".
From: Bear Bottoms on 30 Aug 2006 22:17 On Wed, 30 Aug 2006 20:19:52 -0500, Sauron <Sauron(a)dontfeed.me> wrote: and that test would be where? -- I research freeware http://bearbottoms1.com
From: Bear Bottoms on 30 Aug 2006 22:25
On Wed, 30 Aug 2006 20:19:52 -0500, Sauron <Sauron(a)dontfeed.me> wrote: > Bear Bottoms schreef: >> On Wed, 30 Aug 2006 13:08:18 -0500, Allan Higdon >> <alhigdon(a)mailinator.com> wrote: >> >>> On Tue, 29 Aug 2006 16:18:45 -0500, Bear Bottoms >>> <bearbottoms1(a)cox.net> wrote: >>> >>>> On Tue, 29 Aug 2006 03:06:02 -0500, Sir Psycho >>>> <totalharmonicdistortion(a)hotmail.com> wrote: >>>> >>>>> Hi there, >>>>> >>>>> Now that Kerio Personal Firewall has gotten all bloated up im looking >>>>> for an alternative. >>>>> >>>>> One of its handy fetaures was that it told you what program wanted to >>>>> connect out, what protocol it used, what port and allowed you to >>>>> create >>>>> rules based on these connections. >>>>> >>>>> Has anyone found something similar thats lightweight? >>>>> >>>>> Thank you all >>>>> >>>> >>>> Ashampoo...it's the best right now. http://bearbottoms1.com >>>> >>> >>> I tried it out myself. >>> When I used the ShieldsUp site (Common Ports), the ports were mostly >>> Closed, with a few actually Open. >>> No Stealth at all. >>> A post from "Justme" on 8/24 mentioned the same result. >>> >> I'm running the test again now: >> File sharing: >> Attempting connection to your computer. . . >> Shields UP! is now attempting to contact the Hidden Internet Server >> within your PC. It is likely that no one has told you that your own >> personal computer may now be functioning as an Internet Server with >> neither your knowledge nor your permission. And that it may be serving >> up all or many of your personal files for reading, writing, >> modification and even deletion by anyone, anywhere, on the Internet! >> Your Internet port 139 does not appear to exist! >> One or more ports on this system are operating in FULL STEALTH MODE! >> Standard Internet behavior requires port connection attempts to be >> answered with a success or refusal response. Therefore, only an attempt >> to connect to a nonexistent computer results in no response of either >> kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's >> very cool!) which represents advanced computer and port stealthing >> capabilities. A machine configured in this fashion is well hardened to >> Internet NetBIOS attack and intrusion. >> Unable to connect with NetBIOS to your computer. >> All attempts to get any information from your computer have FAILED. >> (This is very uncommon for a Windows networking-based PC.) Relative to >> vulnerabilities from Windows networking, this computer appears to be >> VERY SECURE since it is NOT exposing ANY of its internal NetBIOS >> networking protocol over the Internet. >> Common Ports: all ports are stealth >> All Service Ports: True Stealth Analysis: all ports are stealth >> Messenger Spam: No return Browser header: Opera...we know the >> answer...great. >> It completely passed the Shields up test as stealth. >> Now for the LEAK TEST (specific firewall test) "drum roll": leak >> test 1.x unable to connect. >> So it passed all of the tests...what are you talking about???? >> --I research freeware http://bearbottoms1.com > > I think he might refer to this : > > Ping Reply: RECEIVED (FAILED) — Your system REPLIED to our Ping (ICMP > Echo) requests, making it visible on the Internet. Most personal > firewalls can be configured to block, drop, and ignore such ping > requests in order to better hide systems from hackers. This is highly > recommended since "Ping" is among the oldest and most common methods > used to locate systems prior to further exploitation. > > Run the test and this is the only thing that makes the test say True > stealth analysis failed. > I passed both in true stealth...see above: ShieldsUP! 45,054,203 system tests The Internet's quickest, most popular, reliable and trusted, free Internet security checkup and information service. And now in its Port Authority Edition, it's also the most powerful and complete. Check your system here, and begin learning about using the Internet safely. LeakTest 6,337,863 downloads Ensure that your PC's personal firewall can not be easily fooled by malicious "Trojan" programs or viruses. Thanks to this first version of LeakTest, most personal firewalls are now safe from such simple exploitation. -- I research freeware http://bearbottoms1.com |