Dear List friends, When i scan my own domain from an out side host using 'nmap' tool it shows following results. How do i block this kind of tracing using linux. Please help me.
nmap tracing result, PORT STATE SERVICE VERSION 25/tcp open smtp netqmail smtpd 1.04 53/tcp open domain 80/tcp open http Apache httpd 2.2.6 ((Gentoo)) 110/tcp open pop3 Courier pop3d 119/tcp open ssh OpenSSH 4.7 (protocol 2.0) 209/tcp open tam? 443/tcp open http Apache httpd 2.2.6 ((Gentoo)) 628/tcp open tcpwrapped 993/tcp open ssl/imap Courier Imapd (released 2005) 995/tcp open ssl/pop3 Courier pop3d -- --- - Widyachacra Rajapaksha - * Lots of people make the mistake of thinking that Microsoft is a software company. That's wrong. Microsoft is an abuse company that uses software as a method of delivering abuse. * Never let a woman know that YOU are interested in her. Love is a wish that hides in your heart, and nobody knows about it but YOU Reply With Quote
