Solved

Network security

Posted on 2002-04-23
4
141 Views
Last Modified: 2010-04-11
Here is a muli part question.

1) How secure are the computers (PC's)that are connected to a a boadband router that assigns non-routable IP addresses.

2) Can you disable ports on
 2a) Windows 98?
 3a) Windows NT Server?
 4a) NT 4.0 Server ?
 5a) NT Workstation?
 6a) Windows 2000?
 7a) Windows XP Pro
 8a) Windows XP home

3) When hackers probe you IP address and ports what are their intent.

Thanks

Jeff
0
Comment
Question by:jeffg_91911
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6964981
1) unsecure at all
2a) - 8a) AFAIK no (except with special Add-on software, like firewalls, which replace most of M$)
3) any, whatever you imagine, and whatever you forget to imagine ;-)
0
 
LVL 8

Accepted Solution

by:
scraig84 earned 300 total points
ID: 6965478
To add a little:

1) Broadband routers typically perform address translation.  Translation will provide a very small amount of security in that it will block very basic scans etc.  It can be likened to locking your car door.  It will deter the casual thief.  However, in both cases these methods will not block anybody who is truly serious about getting in.

2) Ports are opened because you have services that use them.  Shut down the services and the ports close as well.  However, you usually want some people (on the LAN) to use these ports.  A firewall is needed in this case to block access to ports from external hosts.  If you have multiple machines to protect, it would be best to get a small SOHO firewall.  There are a number of vendors in this market - Watchguard probably being one of the biggest.  Cisco also released a 10 user PIX model for about $400.  If you have just one computer to protect, you can use a personal firewall which is software installed on the PC.  Norton and ZoneLabs are a couple of big names here.

3) Like Ahoffman said above - just about anything.  Most often with smaller targets, the intent is to use that machine to perform other attacks to hide identity.  However, they may just want to cause mischief, and get a kick out of trashing your data.

Hope that helps.
0
 
LVL 1

Expert Comment

by:ymash
ID: 6967215
As far as ports locking, you can do that on NT, 2000, and XP. only you don't block specific ports, you open only the ports you need to open. You can do that in the Network control panel. XP has extended features and a built-in firewall.

Some of the broadband routers also have built-in firewalls, they are not the best, but for a home network they are good enough. Linksys has one for about $80. While Watchguard, cisco and others are better, you realy don't need to spend all teh money for a small home network.
0
 

Author Comment

by:jeffg_91911
ID: 7022260
Not exactlly the knid of details I was looking for.
But appreciate the help and good points.

Thanks

Jeff
0

Featured Post

Defend Your Organization from The Greatest Threats

Looking to fill the gaps in your security? Bring together information from the network, endpoint and threat intelligence feeds to really see what's happening in your organization. Join the WatchGuardians in their adventures fighting cyber crime!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question