Я короче не кул-хацкер, и не хацкер совсем, и не светит судя по всему мне им быть в ближайшем будущем:lame: :lame:
Сходил я по ссылке
www.grc.com и тама нашел такую вещь как
ShieldsUP
Вроде как она тестирует в вашу пробиваемость здесь и сейчас
Вот отсчет(часть) о попытке пробраться ко мне...
------------------------------------------------------------------------------
Please Stand By. . .
Attempting connection to your computer. . .
Shields UP! is now attempting to contact the Hidden Internet Server within your PC. It is likely that no one has told you that your own personal computer may now be functioning as an Internet Server with neither your knowledge nor your permission. And that it may be serving up all or many of your personal files for reading, writing, modification and even deletion by anyone, anywhere, on the Internet!
Your Internet port 139 does not appear to exist!
One or more ports on this system are operating in FULL STEALTH MODE! Standard Internet behavior requires port connection attempts to be answered with a success or refusal response. Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!) which represents advanced computer and port stealthing capabilities. A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion.
Unable to connect with NetBIOS to your computer.
All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet.
Before You Break Out
the Champagne...
It is true that this server was unable to connect to your machine just now — and that's definitely great news! But with the benefit of the incredible experience I'm gaining from the impact of this site's 13,919,988 (and counting) recent visitors, I'm rapidly evolving more robust and reliable means of determining a remote machine's Internet vulnerability.
What I could NOT do today,
I MIGHT be able to do tomorrow.
Useful as this facility is today, I have the feeling it's going to get better — and I'm working on a few new ideas right now. So please consider this site to be in "BETA" condition and please return here — at least briefly — a week or two from now to verify that your system is still hardened against all the experience I've gained during the first few weeks of this site's life.
When this message has disappeared, you'll know that I've explored every possible Windows NetBIOS file sharing avenue and penetration strategy that I, or anyone else, have imagined. I will be notifying the members of my User Managed eMail System when this site has stabilized, and also at any future time when significant new vulnerability detection has been added. You are invited to join our 607,763 members to receive these notifications.
A FALSE sense of security
is worse than being unsure.
-----------------------------------------------------------------------
Стоит у мя аутпост и ни окаких крутых настройках с моими познаниями сетей говорить не приходиться
Оцените плиз(не на мне ест-но)
А проверка на длоступность портов показала, что доступен 113 порт Вопрос: как в аутпосте настраивать порты:lame:
И еще что за сервис в ХР svchost?
Он постоянно запущен в неск-ких экземплярах, и частенько рветься в Инет.
Ввиду поного:lame: просьба на мне не упражняться