Solved

Network security

Posted on 2002-04-23
4
140 Views
Last Modified: 2010-04-11
Here is a muli part question.

1) How secure are the computers (PC's)that are connected to a a boadband router that assigns non-routable IP addresses.

2) Can you disable ports on
 2a) Windows 98?
 3a) Windows NT Server?
 4a) NT 4.0 Server ?
 5a) NT Workstation?
 6a) Windows 2000?
 7a) Windows XP Pro
 8a) Windows XP home

3) When hackers probe you IP address and ports what are their intent.

Thanks

Jeff
0
Comment
Question by:jeffg_91911
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 6964981
1) unsecure at all
2a) - 8a) AFAIK no (except with special Add-on software, like firewalls, which replace most of M$)
3) any, whatever you imagine, and whatever you forget to imagine ;-)
0
 
LVL 8

Accepted Solution

by:
scraig84 earned 300 total points
ID: 6965478
To add a little:

1) Broadband routers typically perform address translation.  Translation will provide a very small amount of security in that it will block very basic scans etc.  It can be likened to locking your car door.  It will deter the casual thief.  However, in both cases these methods will not block anybody who is truly serious about getting in.

2) Ports are opened because you have services that use them.  Shut down the services and the ports close as well.  However, you usually want some people (on the LAN) to use these ports.  A firewall is needed in this case to block access to ports from external hosts.  If you have multiple machines to protect, it would be best to get a small SOHO firewall.  There are a number of vendors in this market - Watchguard probably being one of the biggest.  Cisco also released a 10 user PIX model for about $400.  If you have just one computer to protect, you can use a personal firewall which is software installed on the PC.  Norton and ZoneLabs are a couple of big names here.

3) Like Ahoffman said above - just about anything.  Most often with smaller targets, the intent is to use that machine to perform other attacks to hide identity.  However, they may just want to cause mischief, and get a kick out of trashing your data.

Hope that helps.
0
 
LVL 1

Expert Comment

by:ymash
ID: 6967215
As far as ports locking, you can do that on NT, 2000, and XP. only you don't block specific ports, you open only the ports you need to open. You can do that in the Network control panel. XP has extended features and a built-in firewall.

Some of the broadband routers also have built-in firewalls, they are not the best, but for a home network they are good enough. Linksys has one for about $80. While Watchguard, cisco and others are better, you realy don't need to spend all teh money for a small home network.
0
 

Author Comment

by:jeffg_91911
ID: 7022260
Not exactlly the knid of details I was looking for.
But appreciate the help and good points.

Thanks

Jeff
0

Featured Post

Now Available: Firebox Cloud for AWS and FireboxV

Firebox Cloud brings the protection of WatchGuard’s leading Firebox UTM appliances to public cloud environments. It enables organizations to extend their security perimeter to protect business-critical assets in Amazon Web Services (AWS).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Hostname printer change 8 68
HP 2530 switch and routing 4 58
PTR DNS record question 1 26
X2 to x0 on sonicwall tz200 1 17
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question