Anyone using PcCillin2002 or Zonealarm firewalls

Todd-'o'-Vision

Super xVirgin Man
Joined
Jan 2, 2002
Posts
5,609
If you have are you amazed with the amount of activity directed against your computer or by use of your computer.

I notice my comptuer has been recieved quite a bit of SYN flooding
 
What's that? And no, it's been quiet here. Well, if you discount the music I'm playing.
 
Before I turned off the notices whenever something tried to access your computer from the net the damn thing was popping up every few seconds. So and so tried to access, he did, she did , they did. DAMN!
 
I was using ZoneAlarm for awhile and noted no really alarming activity. However, I learned that ZoneAlarm is not compatible with McAfee Viruscan software.

So I bought McAfee's Internet Security package only to learn that it won't even install unless I have IE4.0 SPx or a newer version of IE installed on my computer!

Since I don't use IE, I found that particularly annoying. If that little limitation is noted on the outside of the package, I sure couldn't find it. :confused: :mad:
 
I use Black Ice Defender... seems to do well

It's amazing the activities that go on "behind the scences"

what I don't understand is the "TCP OS fingerprints" anyone ever heard of this?
 
I've got three firewalls. I realize that it is redundant for average surfing, but I go into IRC every once in a while and my bubbas like to play hacker.

perks:

The gist: they wanna know what you have running your puter, Operating System, so they can use its holes and backdoors to suck out whatever info you've got in there.

http://www.insecure.org/nmap/nmap-fingerprinting-article.html

ABSTRACT

This paper discusses how to glean precious information about a host by
querying its TCP/IP stack. I first present some of the "classical"
methods of determining host OS which do not involve stack
fingerprinting. Then I describe the current "state of the art" in
stack fingerprinting tools. Next comes a description of many
techniques for causing the remote host to leak information about
itself. Finally I detail my (nmap) implementation of this, followed
by a snapshot gained from nmap which discloses what OS is running on
many popular Internet sites.


REASONS

I think the usefulness of determining what OS a system is running is
pretty obvious, so I'll make this section short. One of the strongest
examples of this usefulness is that many security holes are dependent
on OS version. Lets say you are doing a penetration test and you find
port 53 open. If this is a vulnerable version of Bind, you only get
one chance to exploit it since a failed attempt will crash the daemon.
With a good TCP/IP fingerprinter, you will quickly find that this
machine is running 'Solaris 2.51' or 'Linux 2.0.35' and you can adjust
your shellcode accordingly.
 
I've seen someone wipe someone elses operating system off their computer, just because they were using black ice. Somehow he got in through a back door and wiped the OS.

I use Zone Alarm and ConSeal. ConSeal is nuts, couldn't believe how many taps I was getting on it. And playing in IRC can be fun, but it also gets old after awhile. He floods her, she floods him, blah.
 
I'm about to start DSL service. What special precautions and/or security concerns does this type of connection bring? I currently run zone alarm and tiny firewalls. are these enough?
 
According to my Black Ice Defender log.. all incoming intruders have been stopped.

And my OS is still working.. so I guess I'm ok so far..

but you have me wondering now..
 
Back
Top