On 7/4/05, James Button <[EMAIL PROTECTED]> wrote: 
> 
> Pete,
> 
> While you can get a list ( via google etc.) of what ports are used for 
> which
> specific activities,
> the reported uses are 'normally used for' rather than 'are only used for'
> and most definitely not 'can only be used for'.
> 
> What you need is a good firewall - one that monitors and allows you to
> control both in, and out usage
> as well as reporting session initiation.
> 
> And - use one or more of the online facilities for checking your systems
> vulnerability
> 
> JimB.
> 
> 
> ----- Original Message -----
> From: "Pete Holsberg" <[EMAIL PROTECTED]>
> To: <[email protected]>
> Sent: Monday, July 04, 2005 5:22 PM
> Subject: Ports Used Normally?
> 
> 
> > If I execute
> >
> > netstat -an
> >
> > I see a long long list of stuff. How can I tell if any of
> > the ports shown are being used for nefarious purposes?
> >
> > Thanks.
> >
> > ---
> > Pete Holsberg
> > Columbus, NJ

 A good firewall would be Sygate Personal (free) which incorporates a 
security test utility.
 See https://www.grc.com/ for testing your system.
-- 
Dave Jackson
Tamworth UK

--
                ----------------------------------------
WIN-HOME Archives:  http://PEACH.EASE.LSOFT.COM/archives/WIN-HOME.html
Contact the List Owner about anything:  [EMAIL PROTECTED]
Official Win-Home List Members Profiles Page
 http://www.besteffort.com/winhome/Win-HomeListMembersProfiles.html

Reply via email to