View Poll Results: Does AntiOnline suffer from a mild case of feature-itis...
- Voters
- 31. You may not vote on this poll
-
Yes... all them damn features..
-
Well, I like some of them new features...
-
I kinda like the new features..
-
Hell no!! I want more features..
-
January 26th, 2002, 07:51 PM
#1
Junior Member
Open Port Vulnerability
I've heard a lot about firewalls keeping ports closed but I dont seem to understand how my computer is at risk.m1823@hotmail.com
I may be a slow walker but I never walk backwards.
-
January 27th, 2002, 02:29 PM
#2
-
January 27th, 2002, 03:04 PM
#3
Junior Member
Thanks. I've read a little about how services are run on some ports and how unused ports can be closed by a firewall. What I don't know is if a hacker scans my ports and finds port 80 open for instance, how can he/she take advantage of that port?
-
January 27th, 2002, 03:29 PM
#4
Yeah.. There are always exploits for almost every OS/Deamon.. Take Oracle9i.. They said it was un-hackable... Now someone is 1 million $ richer... Port 80 can be taken advantage of depending on what HTTP Deamon you are running....There are almost buffer overflows and the like.... But I have never heard of a extremely serious exploit for port 80.... Apache is a pretty secure HTTP Deamon.... But IIS 4.0/5.9 has bugs everywhere, Whatever you do.. KEEP AWAY FROM IIS..... I know this website which scans your computer for free for about 900 exploits.. and scans all your ports....SecuritySpace
And in case you wanted to look for some exploits/patches look here Have fun.. Hope this helps you out
-
January 28th, 2002, 03:20 AM
#5
well.. it takes more than a firewall to stop a hacker.. it will just slow them down..
and dont worry too much.. No hacker in its right mind would even bother cracking into a Home PC... they are more interested in Servers.. which holds valuable information..
-
January 28th, 2002, 09:21 AM
#6
Member
Originally posted by s0nIc
and dont worry too much.. No hacker in its right mind would even bother cracking into a Home PC... they are more interested in Servers.. which holds valuable information..
true that the server has more valuable info, but home pc has also been targetted, esp for later used by hackers for ddos attacks... protection is always good.
rgds
de
-
January 28th, 2002, 10:54 AM
#7
Member
home hacking......
most the people that try to hack home computers are lamers or newbies, and when a lamer runs into a firewall or anything other then a trojan server running on the computer they will give up. Most the time if a real hacker is going for a home computer it's becouse they DoS attacked, or scanned them..... don't **** with ppl that know what there doing
-
January 28th, 2002, 05:34 PM
#8
Re: Open Port Vulnerability
Originally posted by m18213
I've heard a lot about firewalls keeping ports closed but I dont seem to understand how my computer is at risk.m1823@hotmail.com
It may not be. An open port doesn't actually do anything. It's perfectly safe to run a computer unfirewalled on the 'net. The one proviso is that you don't use any daemons (or services, in the Windows world) that listen on any ports. The minute you do, those open ports become dangerous.
s0nIc: It is very naive to think that hackers won't be interested in a home PC. They may not be AS interested in a home PC, but having remote control over a computer on the internet is still worth it, even if the PC is a Home PC.
Just because a port isn't firewalled does not mean it's 'open' in the sense of 'listening'.
Chris Shepherd
The Nelson-Shepherd cutoff: The point at which you realise someone is an idiot while trying to help them.
\"Well as far as the spelling, I speak fluently both your native languages. Do you even can try spell mine ?\" -- Failed Insult
Is your whole family retarded, or did they just catch it from you?
-
January 28th, 2002, 06:15 PM
#9
Junior Member
-
January 28th, 2002, 06:26 PM
#10
m18213 There is somewhat greater possibility that a hacker will borrow your computer to Launch a DOS. Typically, a DOS starts out by the hacker planting logic bombs in various computers around the world.Then on the big day, the hacker contacts each bomb, sends the trigger command, and the DOS attacks begins.
But honestly Do you really think that a hacker is going to launch a colossal transmission from your HUMBLE SYSTEM, when there are so many far more powerful machines...
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|