Solved

Rule : Default Windows File Sharing

Posted on 2007-04-04
1
169 Views
Last Modified: 2013-12-04
I was checking the log of my antivirus, I found in th log:
4/3/2007 10:10:43 PM,"Rule ""Default Windows File Sharing"" permitted (###.##.###.133,netbios-ssn(139)).","Rule ""Default Windows File Sharing"" permitted (###.##.###.133,netbios-ssn(139)).  Inbound TCP connection.   Local address,service is (MYPCNAME(###.##.###.186),netbios-ssn(139)).  Remote address,service is (###.##.###.133,3426).  Process name is ""System""."

now I live in a building where there are 200 pcs on a Lan all start with ###.##.###.XXXX , where XXXX is a fixed number of each user. I dont know the address ###.##.###.133 mine is ###.##.###.186, does it mean someone is hacking mine, as I find the message several times!!, what is this "rule" and how to secure my pc better.
0
Comment
Question by:TheSilverBullet
1 Comment
 
LVL 19

Accepted Solution

by:
CoccoBill earned 250 total points
ID: 18857022
Are all the machines in the network are in the same segment? It looks like someone is trying to access your file shares. I wouldn't call it hacking, just that someone is using a service that your computer has open. You might want to stop sharing your folders if you have no need to do so, or at least protect the shares from outsiders with ACLs.

http://support.microsoft.com/kb/304040
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Admin File Share Access 9 84
Flux question 2 115
Looking for software to monitor computer activity - Spector is gone, what's available? 8 173
Read-only access for auditors 5 76
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question