thanx andrew. i m learning. i will pass the word around....
--- Andrew Suffield <[EMAIL PROTECTED]> wrote: > On Tue, Dec 18, 2007 at 08:10:47PM -0800, Linux > Advocate wrote: > > Andrew, thanx for the headsup. Specifically what > is > > wrong with that site? In what way is their scan > > inaccurate? I would like to warn some of my other > > buddies... > > Enumerating all of the ways in which it is alarmist > marketing noise > would take forever, but here's a few examples: > > > > Solicited TCP Packets: RECEIVED (FAILED) %Gâ%@ > As detailed in > > the port report below, one or more of your > system's ports actively > > responded to our deliberate attempts to establish > a connection. It > > is generally possible to increase your system's > security by hiding > > it from the probes of potentially hostile hackers. > > Sheer nonsense. The system is rejecting those > connections, it is not > magically somehow "more secure" if it doesn't send a > RST packet. > > > Ping Reply: RECEIVED (FAILED) %Gâ%@ Your > system REPLIED to our > > Ping (ICMP Echo) requests, making it visible on > the Internet. Most > > personal firewalls can be configured to block, > drop, and ignore such > > ping requests in order to better hide systems from > hackers. This is > > highly recommended since "Ping" is among the > oldest and most common > > methods used to locate systems prior to further > exploitation. > > There are no recorded instances of people using ping > to find systems > to exploit. What would be the point? Ping is useful > only to people who > are trying to diagnose network faults, and disabling > it causes nothing > but harm to their efforts. > > > Secure Shell provides a secure-connection version > of the Telnet > > remote console service with additional features. > Unfortunately, the > > SSH services and their security add-on packages > have a long history > > of many widely exploited buffer overflow > vulnerabilities. > > A long history of a whole two exploits in the past > decade or so. > > > What you have to realise is that grc.com is trying > to sell you stuff > (used to be zonealarm, I haven't bothered to check > what it is these > days). It's all about trying to convince you that a > problem exists, so > that you'll pay for one of their 'solutions'. > > Even if you do manage to 'pass' their tests, that > doesn't really mean > anything because all they test are the low-valued > TCP ports. There's > plenty of stuff in common use that doesn't work that > way, like > bittorrent or DNS. If you want to test your firewall > properly, you're > going to have to use something else anyway. > > ------------------------------------------------------------------------- > SF.Net email is sponsored by: > Check out the new SourceForge.net Marketplace. > It's the best place to buy or sell services > for just about anything Open Source. > http://ad.doubleclick.net/clk;164216239;13503038;w?http://sf.net/marketplace > _______________________________________________ > Shorewall-users mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/shorewall-users > ____________________________________________________________________________________ Looking for last minute shopping deals? Find them fast with Yahoo! Search. http://tools.search.yahoo.com/newsearch/category.php?category=shopping ------------------------------------------------------------------------- SF.Net email is sponsored by: Check out the new SourceForge.net Marketplace. It's the best place to buy or sell services for just about anything Open Source. http://ad.doubleclick.net/clk;164216239;13503038;w?http://sf.net/marketplace _______________________________________________ Shorewall-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/shorewall-users
