Quoted: You could fill books with what I do not know about computers -- I am thinking maybe someone by accident or on purpose downloaded a pic with one of those J peg (whatever you call it) venerabilities into the gallery and it is doing whatever it does ???
Computer guys ---------- any thoughts.
|
I've already said that these are not port scans. Anytime you visit a site you generate traffic that could be misinterpreted as a port scan. The trick is becoming familiar enough with what you are doing on your computer to recognize non hostile hits from a concerted port scan.
As to the jpeg issue, if you did view a compromised picture from a computer that had not been properly patched the traffic would not be from the source to you, it would be from you to a destination the hacker could access i.e. a computer he controls.
By the way, if you are relying upon the firewall built into XP, it would not protect you from information leaking from your computer to another source.