firewall

Status
Niet open voor verdere reacties.

robbym

Nieuwe gebruiker
Lid geworden
20 nov 2010
Berichten
3
Ik heb laatst het programma uTorrent.exe geinstalleerd en dat vroeg om een poort (wat het ook zijn moge) van de Firewall open te zetten.
Dat heb ik gedaan.
Weet iemand hoe ik kan zien (bijvoorbeeld door een programma) of mijn firewall (nog) veilig staat ingesteld?
Alvast bedankt.
 
Laatst bewerkt:
Hoi, volgens mij vraagt hij tijdens de installatie om een uitzondering aan de firewall toe te voegen zodat dit programma niet wordt geblokkeerd door je firewall. Als je toch wilt controleren welke poorten je open hebt staan kun je hier even een testje doen.
https://www.grc.com/x/ne.dll?bh0bkyd2

Groetjes,

Tolga
 
uitkomst van site : https://www.grc.com/x/ne.dll?rh1dkyd2

Hallo Tolga,
bedankt voor jouw advies.
ik krijg het volgende op die site:

Attempting connection to your computer. . . Shields UP! is now attempting to contact the Hidden Internet Server within your PC. It is likely that no one has told you that your own personal computer may now be functioning as an Internet Server with neither your knowledge nor your permission. And that it may be serving up all or many of your personal files for reading, writing, modification and even deletion by anyone, anywhere, on the Internet!

Your Internet port 139 does not appear to exist!

One or more ports on this system are operating in FULL STEALTH MODE! Standard Internet behavior requires port connection attempts to be answered with a success or refusal response. Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!) which represents advanced computer and port stealthing capabilities. A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion. Unable to connect with NetBIOS to your computer.

0 <nil> Closed Your computer has responded that this port exists but is currently closed to connections.

21 FTP Closed Your computer has responded that this port exists but is currently closed to connections.

22 SSH Closed Your computer has responded that this port exists but is currently closed to connections.

23 Telnet Closed Your computer has responded that this port exists but is currently closed to connections.

25 SMTP Closed Your computer has responded that this port exists but is currently closed to connections.

79 Finger Closed Your computer has responded that this port exists but is currently closed to connections.

80 HTTP Closed Your computer has responded that this port exists but is currently closed to connections.

110 POP3 Closed Your computer has responded that this port exists but is currently closed to connections.

113 IDENT Closed Your computer has responded that this port exists but is currently closed to connections.

119 NNTP Closed Your computer has responded that this port exists but is currently closed to connections.

135 RPC Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

139 NetBIOS Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

143 IMAP Closed Your computer has responded that this port exists but is currently closed to connections.

389 LDAP Closed Your computer has responded that this port exists but is currently closed to connections.

443 HTTPS Closed Your computer has responded that this port exists but is currently closed to connections.

445 MSFTDS Stealth There is NO EVIDENCE WHATSOEVER that a port (or even any computer) exists at this IP address!

1002 ms-ils Closed Your computer has responded that this port exists but is currently closed to connections.

1024 DCOM Closed Your computer has responded that this port exists but is currently closed to connections.

1025 Host Closed Your computer has responded that this port exists but is currently closed to connections.

1026 Host Closed Your computer has responded that this port exists but is currently closed to connections.

1027 Host Closed Your computer has responded that this port exists but is currently closed to connections.

1028 Host Closed Your computer has responded that this port exists but is currently closed to connections.

1029 Host Closed Your computer has responded that this port exists but is currently closed to connections.

1030 Host Closed Your computer has responded that this port exists but is currently closed to connections.

1720 H.323 Closed Your computer has responded that this port exists but is currently closed to connections.

5000 UPnP Closed Your computer has responded that this port exists but is currently closed to connections.

maar hij zegt ook FAILED
Is het nu goed?
 
als je op proceed - all service ports klikt krijg je een beter overzicht van welke poorten er open staan.
 
Gedaan

Hallo Tolga,
bedankt voor jouw advies.
ik heb gedaan wat je vroeg.
bijna alle blokjes (op 5 na) zijn blauw.
volgens mij is dit niet goed of wel, en zo niet, wat kan ik eraan doen?

hieronder staat het resultaat :

Solicited TCP Packets: RECEIVED (FAILED) — As detailed in the port report below, one or more of your system's ports actively responded to our deliberate attempts to establish a connection. It is generally possible to increase your system's security by hiding it from the probes of potentially hostile hackers. Please see the details presented by the specific port links below, as well as the various resources on this site, and in our extremely helpful and active user community.



Unsolicited Packets: PASSED — No Internet packets of any sort were received from your system as a side-effect of our attempts to elicit some response from any of the ports listed above. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system remained wisely silent. (Except for the fact that not all of its ports are completely stealthed as shown below.)



Ping Reply: RECEIVED (FAILED) — Your system REPLIED to our Ping (ICMP Echo) requests, making it visible on the Internet. Most personal firewalls can be configured to block, drop, and ignore such ping requests in order to better hide systems from hackers. This is highly recommended since "Ping" is among the oldest and most common methods used to locate systems prior to further exploitation.
 
Status
Niet open voor verdere reacties.
Terug
Bovenaan Onderaan