Dear List friends,

When i scan my own domain from an out side host using 'nmap' tool it shows
following results. How do i block this kind of tracing using linux. Please
help me.

nmap tracing result,

PORT    STATE SERVICE    VERSION
25/tcp  open  smtp       netqmail smtpd 1.04
53/tcp  open  domain
80/tcp  open  http       Apache httpd 2.2.6 ((Gentoo))
110/tcp open  pop3       Courier pop3d
119/tcp open  ssh        OpenSSH 4.7 (protocol 2.0)
209/tcp open  tam?
443/tcp open  http       Apache httpd 2.2.6 ((Gentoo))
628/tcp open  tcpwrapped
993/tcp open  ssl/imap   Courier Imapd (released 2005)
995/tcp open  ssl/pop3   Courier pop3d


-- 
---

- Widyachacra Rajapaksha -

*  Lots of people make the mistake of thinking that Microsoft is a software
company. That's wrong. Microsoft is an abuse company that uses software as a
method of delivering abuse.

* Never let a woman know that YOU are interested in her.
Love is a wish that hides in your heart, and nobody knows about it but YOU
Reply With Quote

Reply via email to