On 7/4/05, James Button <[EMAIL PROTECTED]> wrote: > > Pete, > > While you can get a list ( via google etc.) of what ports are used for > which > specific activities, > the reported uses are 'normally used for' rather than 'are only used for' > and most definitely not 'can only be used for'. > > What you need is a good firewall - one that monitors and allows you to > control both in, and out usage > as well as reporting session initiation. > > And - use one or more of the online facilities for checking your systems > vulnerability > > JimB. > > > ----- Original Message ----- > From: "Pete Holsberg" <[EMAIL PROTECTED]> > To: <[email protected]> > Sent: Monday, July 04, 2005 5:22 PM > Subject: Ports Used Normally? > > > > If I execute > > > > netstat -an > > > > I see a long long list of stuff. How can I tell if any of > > the ports shown are being used for nefarious purposes? > > > > Thanks. > > > > --- > > Pete Holsberg > > Columbus, NJ
A good firewall would be Sygate Personal (free) which incorporates a security test utility. See https://www.grc.com/ for testing your system. -- Dave Jackson Tamworth UK -- ---------------------------------------- WIN-HOME Archives: http://PEACH.EASE.LSOFT.COM/archives/WIN-HOME.html Contact the List Owner about anything: [EMAIL PROTECTED] Official Win-Home List Members Profiles Page http://www.besteffort.com/winhome/Win-HomeListMembersProfiles.html
