User Panel
Posted: 1/12/2005 3:08:15 PM EDT
Steve Gibson (GRC.com) ShieldsUP I use this once a week
I hope you see Stealth Status I use wireless thru my entire home. COPY and PASTE this into your address bar: https://www.grc.com/x/ne.dll?bh0bkyd2 Try common ports first. |
|
I use it because i feel secure by knowing my system is protected properly. I like you guys in this forum to share some of my protection methods.
|
|
www.broadbandreports.com also has free port scan tools, among other useful tools, I'd try those and I have used them myself.
|
|
broadbandreports.com, aka DSLReports.com, is like this site but huge and devoted to all things related to internet, PC's and related apps, like gaming, security, etc....
|
|
Gibson is good schtuff!!!!!!
kill the messanger - spinrite - lots of good stuff there. and prolly 1 or 2 I'm forgetting. |
|
I've been using it for yeeears. It's always good to know your safe from those kind of bad peoples out there.
|
|
You shouldn't, but ShieldsUp is a good way to test for open ports. |
|
|
I use it just to make sure that my hardware firewall are working. Which they are. Stealth baby Stealth...
|
|
Contrary to popular belief Steve Gibson is not a recognized authority on PC or Internet security.
|
|
GRC Port Authority Report created on UTC: 2005-01-13 at 01:33:32
Results from scan of ports: 0, 21-23, 25, 79, 80, 110, 113, 119, 135, 139, 143, 389, 443, 445, 1002, 1024-1030, 1720, 5000 2 Ports Open 3 Ports Closed 21 Ports Stealth --------------------- 26 Ports Tested Ports found to be OPEN were: xx, xx Ports found to be CLOSED were: 21, 23, 25 Other than what is listed above, all ports are STEALTH. TruStealth: FAILED - NOT all tested ports were STEALTH, - NO unsolicited packets were received, - A PING REPLY (ICMP Echo) WAS RECEIVED. ------------ Your Internet port 139 does not appear to exist! One or more ports on this system are operating in FULL STEALTH MODE! Standard Internet behavior requires port connection attempts to be answered with a success or refusal response. Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!) which represents advanced computer and port stealthing capabilities. A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion. Unable to connect with NetBIOS to your computer. All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet. ---------- I'm pleased, no surprises |
|
I have SBC Yahoo DSL Internet, their modem (wireless) Built in Hardware firewall makes it True Stealth across the board.
|
|
|
|
That is the way they designed their modem (2wire modem). To make your computer invisible to the world.
|
|
Just ran ShieldsUp! and got a perfect Stealth rating! Cool!
Bub |
|
I use Zone Alarm Pro and it came up 100% safe on every test I could find to try.
|
|
0 Ports Open
0 Ports Closed 26 Ports Stealth --------------------- 26 Ports Tested ALL PORTS tested were found to be: STEALTH. TruStealth: PASSED - ALL tested ports were STEALTH, - NO unsolicited packets were received, - NO Ping reply (ICMP Echo) was received. Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice. |
|
The whole stealth vs. closed hype by Steve Gibson is just that - hype. Network security experts will tell you that a stealthed port offers no more security then a closed port. A stealth port does not make you "invisible". If you're running a software firewall on a Windoze platform it is fairly easy to defeat.
If you're running a DSL/cable connection you should be using a properly configured Linux based hardware SPI firewall/NAT router as your first line of defense. If you want to run a SW firewall to monitor your internal network that's fine but don't assume it will protect you. |
|
i just have my friend run a "nmap -O -P0 -sS -A" on me. Its a lot better indicator than these online hunks of junk.
|
|
It's always good to know if someone could pry into your computer without you ever known. If they can Oh-boy. If they can't ,Thumbs up to security....
|
|
I use that site anytime I generate a new machine to make sure it's buttoned up properly.
Just got a new Linksys WRT54G today (thank you newegg.com) to replace a D-Link 804V that went Tango Uniform and ShieldsUP reported complete stealth. Totally invisible from the outside. |
|
Does your dog bite? No. .......Ouch, dammit, I thought you said your dog doesn't bite? Yeah, dummy, but that ain't my dog.
There just ain't nothing like a hardware firewall.............. |
|
Airwolf,
Perfect, obviously you know the importance of being invisible. I feel so much better knowing that my machines are invisible to the world of hackers....BTW the Linksys WRT54G is a nice piece of equipment. |
|
I suppose I did a decent job securing my network. |
|
|
www.insecure.org/nmap/nmap_download.html
www.nessus.org/download/ That should get you started. www.snort.org/ www.tripwire.org/ That will help you catch the bad guys. www.honeyd.org/ Is good for laughs |
|
The absence of a response only means you're firewalled. Stealthed ports do not make you invisible on the Internet.
|
|
A "Stealth" port is one that completely ignores and simply "drops" any incoming packets without telling the sender whether the port is "Open" or "Closed" for business. When all of your system's ports are stealth (and assuming that your personal firewall security system doesn't make the mistake of "counter-probing" the prober), your system will be completely opaque and invisible to the random scans which continually sweep through the Internet.
|
|
Never trust a 'November 2004' Oh, wait.................. |
|
|
Gibson is considered to be 90% hype, 10% fact, in the computer circles I frequent.
Only 23 ports are scanned by his port scanner, when in fact there are over 64 THOUSAND ports. Rkbar has it correct. I would add a caveat to his statement: Network security costs time and money. How secure do you want to be? |
|
99.9999999999% of the random port scans are harmless network traffic on the Internet. No hacker worth his salt is going to run random port scans. If you sleep better that your ports are "stealthed" have at it.
Get yourself a hardware Linux based SPI Firewall NAT/Router, configure it correctly and shut off your software firewalls silly intrusion alerts. The only one who thinks that Steve Gibson is a security expert is Steve Gibson. He's a marketing guy and his website is a marketing tool. "Stating Patricia McNeill : "Gibson is masterful at stirring up an emotional response in the people who come to his site, and then manipulating these people into believing exactly what he wants them to. The tragedy is that these people come to him looking for facts and information, and come away thinking that they have found some! Gibson tries to present himself as a selfless source of public information, yet his entire site is full of emotional manipulation, misinformation, and misdirection. This man is nothing more that a self-promoting braggart." www.grcsucks.com/ |
|
Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!
You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.