It is not any problem being sure.  Having a cable modem connection does make 
you more vulnerable than, perhaps, using a DSL.  Does he have a dynamic IP or 
static?

How long WAS the system up before the firewall was built?

Remember, you may not actually be running any service on that port, and your 
firewall is filtering the port, as indicated by nmap.  Even if you are not 
running any service on a given port detected by nmap, nmap will simply 
provide a name of a service that commonly uses that port.  That initially 
confused me when I first began using nmap.  I thought if it said 
"Backorifice" on port 31337, that meant that Backorifice was installed and 
running on that port.  That is not what it meant.  It meant that port 31337 
was often used by Backorifice.  

Having detected that port with nmap, I could then run a program (backorifice, 
for instance) and see if that port was listening and active.  In the case 
where nmap showed all the windoze boxes with Backorifice on port 31337, not a 
one of them had it actually installed and running (it is more than just a 
hacker tool, it can be used as a remote administration tool like PCAnywhere, 
only it is free).  It is merely a heads up/give you information kind of thing 
that nmap does.  

On Wednesday 07 February 2001 11:23, dany allard you wrote:
> Praedor
>
>     Thanks for the quick reply
>
> The machines is using @home (cable modem connection).
[...]
-- 
Against stupidity, the gods themselves contend in vain.

Reply via email to