Are Your Sheilds up ?

#1
A little test for your firewall and other such security matters.

This was my result.

Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice.


Test availabe here.. Sheilds Up
 
#2
Your Internet port 139 does not appear to exist!
One or more ports on this system are operating in FULL STEALTH MODE! Standard Internet behavior requires port connection attempts to be answered with a success or refusal response. Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!) which represents advanced computer and port stealthing capabilities. A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion.
Unable to connect with NetBIOS to your computer.
All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet.
 
#3
Some nice piccies on your blog there B-M. keep it up
 
#4
Thank you Ark
 
#5
Welcome
 
#6
"Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice."

I'm safe :)
 
#7
Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice.
Me too!! 8)
 

maguire

LE
Book Reviewer
#8
seems quite cool - I appear to be running stealthily. cheers.
 
#10
"Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice."

Probably why macs don't get viruses :)
 
#11
It does work with Firefox
 
#12
Apparently ports 80 and 443 are open on my computer. Anybody any idea what that means?

MsG
 
#13
Port 80 is used for HTTP protocol, commonly used to access the internet.

Port 443 is for the secure encryption version of web pages.

Don't ask me how to put them into stealth mode though :oops:
 
#14
Commander_Vimes said:
Port 80 is used for HTTP protocol, commonly used to access the internet.

Port 443 is for the secure encryption version of web pages.

Don't ask me how to put them into stealth mode though :oops:
Cheers muchly for the info, CV. Any IT gurus out there who know what the score is and if my computer's insecure as a result of these ports being open (whatever that means)?

MsG
 
#17
@whatbiw

Movies not sure - I think they sometimes put out dogdy files in order to catch people. Personally, when I'm downloading stuff likely to attract attention, like Microsoft software or films just released, I use www.furk.net

Although I'm pretty sure I'm safe with my current task of downloading 20gigs of animated Batman :)
 
#18
GRC/Stebve Gibson has been around for a long time, and I've used it since around 2000, but I do wonder about it sometimes. Tons of similar sites have sprung up since. Using Grc.com might not guarantee that our Ports are actually stealthed, or even remotely "safe" at all. On my PC, ShieldsUp reported True Stealth even with just Windows XP Firewall running :roll: A quick look round the Net throws up loads of different ways we can be attacked, monitored, checked out etc, and with all sorts of malware sneaking past our defences. Then there are researchers, marketeers, trackers, hackers, watchers, bad news really isnt it.

Perhaps stopping scripts running and setting up Browsers to check website's security certificates, is also a good idea, I don't know for sure.

Having a decent Firewall (Comodo, Norton, for instance) and decent malware protection, Sygate, Norton, AVG, Kaspersky etc, is a good start. But these days, I wouldn't think my system is ever bulletproof at all.

And IP's often monitor browsing habits as a matter of course, what's being installed with our Broadband provider Software? is a good question.
Comodo last week reported "a programme is snapshotting the screen".

Nefarious/recreational surfing (you know, t+ts and stuff) might for instance best be carried out under stealth, Firefox has add-ons that block cookies and stop tracking and trails. But at the very best, there's probably no such thing as private secure surfing as real privacy and our rights gradually slide down the pan.

Try Hackerwhacker: http://www.hackerwhacker.com/ interesting stuff for any paranoid miscreants.
 
#19
MisterSmith said:
Try Hackerwhacker: http://www.hackerwhacker.com/ interesting stuff for any paranoid miscreants.
eta.hackerwhacker.com uses an invalid security certificate.

The certificate is not trusted because it is self signed.
The certificate expired on 25/02/2007 07:29.

Self signed and expired.... oh dear.

msr
 

Similar threads

Top