Firewalls and Os files??

Posted on 2003-03-30
Medium Priority
Last Modified: 2013-11-16
I'm useing Win98 and I'm on dial up internet access I have a personal firewall running at all times, called Kerio a vary nice program. But now and then when I check the status I see new things on the list. 99% of them I know what they are and what to do with it but now I see this.

[Appliction]       [local IP add]  [remote add] [Status]  [cration time]  [Rx]
KRNL386.exe  TCP      IPaddress      ------    Listening     date/time     0
KRNL386.exe  UDP      IPaddess       ------    Listening     date/time    50
KRNL386.exe  UDP      IPaddress       ----     Listening     date/time     0

There is an IPaddress there but I didn't want to post it, you never know what people can do with to much info.

How is does my Keral have to do with the internet?
and why does only one UDP show as 50?
whats going on?

Question by:Huggy
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Expert Comment

ID: 8240860

Well Im not sure what your first question actually means...
Q . How is does my Keral have to do with the internet?
Sorry dont get it.  maybe clearify.

but in seaching i found this on port 50. do you have a mail program running?

re-mail-ck      50/tcp                          # Remote Mail Checking Protocol
re-mail-ck      50/udp                          # Remote Mail Checking Protocol


Author Comment

ID: 8242370
I have figured out my own question sorry for any wasted time in this madder.

Again sorry.

All I did was set my firewall to block that file from getting out and nothing happened I was still able to send mail and get out to the Internet so we'll see what happens now..
LVL 79

Expert Comment

ID: 8904763
No comment has been added lately (102 days), so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area for this question:

RECOMMENDATION: Accept Huggy's answer http:#8242370 and Refund

Please leave any comments here within 7 days.

-- Please DO NOT accept this comment as an answer ! --


EE Cleanup Volunteer

Accepted Solution

Mindphaser earned 0 total points
ID: 8996163
Force accepted

** Mindphaser - Community Support Moderator **

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
Suggested Courses

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question