J
john
Hi,
I just came back from the shields up website
https://www.grc.com/x/ne.dll?rh1dkyd2 and the analysis I got was this:
Solicited TCP Packets: RECEIVED (FAILED) - As detailed in the port report
below, one or more of your system's ports actively responded to our
deliberate attempts to establish a connection. It is generally possible to
increase your system's security by hiding it from the probes of potentially
hostile hackers. Please see the details presented by the specific port links
below, as well as the various resources on this site, and in our extremely
helpful and active user community.
Ping Reply: RECEIVED (FAILED) - Your system REPLIED to our Ping (ICMP Echo)
requests, making it visible on the Internet. Most personal firewalls can be
configured to block, drop, and ignore such ping requests in order to better
hide systems from hackers. This is highly recommended since "Ping" is among
the oldest and most common methods used to locate systems prior to further
exploitation.
Here is my diagram
both computers have win xp home, fully updated
Here is the diagram
internet
|
|
router
|
|
---------computer 1
|
|
|
computer 2----printer
Should I be concerned or is this an acceptable level of security?
thanks,
chuck
I just came back from the shields up website
https://www.grc.com/x/ne.dll?rh1dkyd2 and the analysis I got was this:
Solicited TCP Packets: RECEIVED (FAILED) - As detailed in the port report
below, one or more of your system's ports actively responded to our
deliberate attempts to establish a connection. It is generally possible to
increase your system's security by hiding it from the probes of potentially
hostile hackers. Please see the details presented by the specific port links
below, as well as the various resources on this site, and in our extremely
helpful and active user community.
Ping Reply: RECEIVED (FAILED) - Your system REPLIED to our Ping (ICMP Echo)
requests, making it visible on the Internet. Most personal firewalls can be
configured to block, drop, and ignore such ping requests in order to better
hide systems from hackers. This is highly recommended since "Ping" is among
the oldest and most common methods used to locate systems prior to further
exploitation.
Here is my diagram
both computers have win xp home, fully updated
Here is the diagram
internet
|
|
router
|
|
---------computer 1
|
|
|
computer 2----printer
Should I be concerned or is this an acceptable level of security?
thanks,
chuck