?
Solved

Closing Ports

Posted on 2004-04-22
4
Medium Priority
?
2,200 Views
Last Modified: 2013-12-04
Hi,

I have just installed win2K Pro and tried to surf the internet. While surfing i noticed that my computer's performance degrades. I used netstat -n and found out that I have a lot of connections, which I did not do.

Checked the ports stated in the netstat -n and compared to a copy of trojan ports list....a lot of those ports are in the list. How do I close them?

Would really appreciate you help on this.

Thanks in advance...
0
Comment
Question by:daviddgiant
  • 2
4 Comments
 
LVL 32

Accepted Solution

by:
LucF earned 150 total points
ID: 10887265
Hi daviddgiant,

> Checked the ports stated in the netstat -n and compared to a copy of trojan
> ports list....a lot of those ports are in the list.
Get a firewall on your computer fast, ZoneAlarm is a very good choice => http://www.zonelabs.com
Then, do a virusscan like http://www3.ca.com/threatinfo/virusinfo/scan.aspx

After you've done all that, use http://www.spychecker.com/program/hijackthis.html let it create a logfile and post it here.

Greetings,

LucF
0
 
LVL 24

Expert Comment

by:SunBow
ID: 10889865
Rather than close them, try blocking them for cheap solution, as recommended by MicroSoft, you must first block with product such as Sygate or ZoneAlarm, then add all Microsoft upgrades to handle vulnerabilities, then get up to date antivirus to identify and clean the system from infections received during the online upgrade.  Do not visit any websites until completed, and try to not stay online on the internet for too long a period until all is patched up. Once surfing, know that there really isn't much for free, without a price, and that performance degredation is a direct result of such web habits as checking to see what you have one, or can download for free.
0
 

Expert Comment

by:Specialists
ID: 12136217
How do the ports get closed?  Please answer that question.  The thrid party answer is unacceptable.
0
 
LVL 32

Expert Comment

by:LucF
ID: 12136680
Specialists,

Please ask your own question (http://www.experts-exchange.com/help.jsp#hs3) although I'd be willing to help you on this, please follow the normal Experts Exchange way of doing this.
One thing you might want to scrap from your question is: "The thrid party answer is unacceptable." as you never know what you might be fighting at.

LucF
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Is your OST file inaccessible, Need to transfer OST file from one computer to another? Want to convert OST file to PST? If the answer to any of the above question is yes, then look no further. With the help of Stellar OST to PST Converter, you can e…
Enter Foreign and Special Characters Enter characters you can't find on a keyboard using its ASCII code ... and learn how to make a handy reference for yourself using Excel ~ Use these codes in any Windows application! ... whether it is a Micr…

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question