February 18th, 2005 04:16 PM
I would consult your routers web interface to either create a rule filtering those ports or in some cases a radio button is available to select to specificaly filter said ports. The router should...
March 31st, 2004 06:20 AM
If you or anyone else is interested you can pick up hping2 for windows at http://packetsurge.com/main.php?surge=downloads. This was ported over by one of our members (syrrus). Any feedback on it...
March 15th, 2004 08:41 AM
I would advise (if you have not already) to check your ports and make sure they are properly filtered excluding any public services. Ethicaly about all you can do is double check your own security...
March 12th, 2004 03:12 AM
I appologize... I got scrambled on my post it is deleted now.
February 15th, 2004 03:40 AM
Perhaps these tools need to make use of raw sockets to create spoofed packets and your OS does not support that?
February 12th, 2004 01:32 AM
Another option that may be of interest on Nmap is the --data_length switch, that will enable you to add to the packet size, possibly defeating some signatures.
A handy tool for Windows users who...
January 21st, 2004 02:56 AM
Getting Sygate sounds like a great idea :)
As to not spam though... you may try adding your broadcast address to your sharing rule.
January 15th, 2004 05:19 AM
I prefer Gaim with its encryption plugin. You can generate 512-4096 bit keys to share and can be found here @ http://gaim-encryption.sourceforge.net/ for free.
You can also use a free certificate...
January 14th, 2004 03:42 AM
I am interested in what your debug log indicates as the issue, this is found in your SPF folder.
Also is there any other reference in your eventviewer to smc.exe or Sygate firewall?
January 13th, 2004 02:12 AM
I am a mod for Sygates forums so perhaps I can help ;)
Since you stated you have had previous firewalls on there, you may want to find each firewalls method for a clean uninstall. I know...
January 10th, 2004 08:19 AM
That article was a follow up to Onstar filling a protest lawsuit against the FBI. If you read this article @ http://news.com.com/2100-1029_3-5109435.html you can see how the FBI already exploited the...
January 10th, 2004 07:21 AM
You can use Regmon 6.06 from http://www.sysinternals.com/ntw2k/source/regmon.shtml
Very nice tools can be found there, this one to monitor the registry is under 80 kb.
Or where you looking...
January 3rd, 2004 10:54 PM
Unless you initiate the connection so the router can keep your connection 'state' and knows where to forward those packets, you will need to port forward or set your PC on the DMZ. If you decide to...
January 3rd, 2004 06:28 AM
We do not know the exact firewall you are talking about but most windows software firewalls allow you to make rules based on IP address(es), port number(s), and application(s). This would be one way...
January 3rd, 2004 02:25 AM
Have you checked for a banner? It could be just about anything, I show the port as unassigned. Services can be bound to oddball ports if needed.
January 3rd, 2004 02:15 AM
I am a mod for Sygate so believe me when I tell you that this is no DoS attack. :rolleyes:
The firewall will alert you to a DoS attack and would drop the packets. Your last log shown is a...
January 2nd, 2004 02:44 AM
Your router will see and filter most of the traffic. You can find the LAN side IP address of the gateway through ifconfig and make it a URL. Example: http://192.168.1.1 Use your browser to connect to...
January 2nd, 2004 02:27 AM
Find the LAN side IP address of the gateway and make it a url like http://192.168.1.1
Then from your browser you should be able to configure it. Your routers documentaion will say what it supports.
January 2nd, 2004 01:50 AM
TheTempest> Your router was probably responding to those probes and not ZA. You will need to see in your routers doc if you can connect to the routers interface and enable SPI or port forwarding (for...
January 2nd, 2004 01:18 AM
<sarcasm> TO much detail here you need to tone it down </sarcasm>
What kind of a setup do you run?
What is your gateway? box? router?
January 1st, 2004 10:17 PM
IPv6 will be in full swing in the year 2008, it is still under development and devices are being tested to handle this traffic between networks. Security is part of the main focus with the...
January 1st, 2004 05:29 AM
This is not the traditional ping/pong packet (ICMP types 8 and 0). This is ICMP type 3 destination unreachable. Were you probed with a UDP packet just prior? ICMP type 3 packets have several code...