Home  |  Forums  |  914 Info  |  Blogs
 
914World.com - The fastest growing online 914 community!
 
Porsche, and the Porsche crest are registered trademarks of Dr. Ing. h.c. F. Porsche AG. This site is not affiliated with Porsche in any way.
Its only purpose is to provide an online forum for car enthusiasts. All other trademarks are property of their respective owners.
 

Welcome Guest ( Log In | Register )

> OT - Firewall explanations needed, identifying those long numbers
cooltimes
post Aug 18 2004, 09:32 AM
Post #1


Advanced Member
****

Group: Members
Posts: 2,508
Joined: 18-May 04
Member No.: 2,081
Region Association: None



Non 914:
Can anyone tell me in dummy language ( simple and understandable) what this below means. (IMG:style_emoticons/default/type.gif)

Blocked incoming TCP
Blocked outgoing TCP
McAfee Firewall blocked an incoming TCP packet. The remote address associated with the traffic was 211.232.56.200 (port 3148). The template rule in effect for this traffic was "Unknown traffic"


I am especially interested in how to look up numbers such as the 211.232.56.200 (port 3148) and identify where they originate. The number shown is just an example of many other numbers the firewall reports.
My firewall shows this often as well as SYN attack blocked.
Thanks.

Cooley
User is offlineProfile CardPM
Go to the top of the page
+Quote Post
 
Reply to this topicStart new topic
Replies
Part Pricer
post Aug 18 2004, 10:49 AM
Post #2


Believe everything I post
***

Group: Benefactors
Posts: 1,825
Joined: 28-December 02
From: Danbury, CT
Member No.: 35



QUOTE(cooltimes @ Aug 18 2004, 11:39 AM)
Why do they want to probe a persons computer? What do they hope to find? Any idea?


You get probed because they are looking for vulnerabilities. They are looking for openings that may let them take over control of your computer. I live in this online underworld everyday and you might be suprised how rampant this is.

I was reading a report this morning that estimates that there are over 3 million PC in the U.S. That are under someone else's control.

They want to place a bot on your machine and turn it into a zombie. Usulally, these PCs can be set into action via a simple IRC command. The most common use of this is to launch distributed Denial of Service attacks.
User is offlineProfile CardPM
Go to the top of the page
+Quote Post

Posts in this topic
cooltimes   OT - Firewall explanations needed   Aug 18 2004, 09:32 AM
Part Pricer   You got probed. :bootyshake: Here's the inf...   Aug 18 2004, 10:09 AM
cooltimes   Thanks. The explanation was superb. Simple is easy...   Aug 18 2004, 10:39 AM
Part Pricer  

Reply to this topicStart new topic
1 User(s) are reading this topic (1 Guests and 0 Anonymous Users)
0 Members:

 

- Lo-Fi Version Time is now: 10th June 2024 - 09:04 AM