Kuzman Ganchev on Tue, 5 Mar 2002 15:00:14 -0500 |
On Mon, Mar 04, 2002 at 11:05:52PM -0500, Michael Leone wrote: > Post your WAN IP address here, and ask somebody to nmap you? :-) There are also a number of places that will portscan some well known ports on your machine e.g. http://www.cotse.com/tools/pscan.htm has a list of scanners. and www.grc.com has a "shields up" service which is basically a well-known port scanner. Kuzman > > > > A good step to take is to remove all software that you don't need. Any > > > program that is on the system is another possible security vulnerability. > > > > Is this still true with the Linksys router (BEFSR41) in place? One thing > > I'm sure I should do is keep the Firmware up to date on the router. > > Yes. Consider ... suppose someone breaks thru the Linksys, and lands on > a machine on your LAN. Now, s/he wants to jump over to your day-to-day > machine, where all the goodies are. Why make it easier for them? > > -- > > Michael J. Leone Registered Linux user #201348 > <mailto:turgon@mike-leone.com> ICQ: 50453890 AIM: MikeLeone > > PGP Fingerprint: 0AA8 DC47 CB63 AE3F C739 6BF9 9AB4 1EF6 5AA5 BCDF > PGP public key: > <http://www.mike-leone.com/~turgon/turgon-public-key.gpg> > > This email scanned for viruses by SOPHOS Sweep for Unix, and > found to be virus-free. Attachment:
pgpRVcer8tq04.pgp
|
|