xp, c:\windows\pfirewall.log

Posted on 2007-08-10
Last Modified: 2013-11-22
I discovered c:\windows\pfirewall.log file and I'm now recording my open ports...this morning my web cam light was on (working from son's PC at his home, w/o router), but these ports are open,
33842, 68, 2630, 2788, his PC being hacked?

I know windows firewall exceptions tab is the starting place, but these IP addresses listed with the TCP, and UDP open and closed ports...what concern should I be facing?

He has a linksys router I'm going to put in place (was in place and settings got out of wack and he took it out)...I know NAT is another level of security

Thanks, jay
Question by:jayindy1
    LVL 10

    Expert Comment

    Hi there, there's a nice tool that checks all the open ports on your PC... go here:

    Scroll down to *Hot Spots* and click on "ShieldsUP!", on the next page click on "Proceed", then on the following page, under "ShieldsUP!!  Services" click on one of the options, I guess on your case it would be "All Service Ports"...

    Maybe this will help you to track down more details...

    As far as NAT, yes, you should definetely do it! For now, also, make sure there are nothing in Exception Tab in the windows firewall...

    Author Comment

    by:jayindy1 the moment I'm only interested in the free stuff...If you could point me to one of the free downloadable tools that would help me monitor port open/closed/usage (maybe from that link you gave me above), I'd appreciate it...once I understand it, maybe I'll purchase the SpinRite, if that is what you are referring to, and regarding my Exceptions tab...I had lots of boxes checked...I've printed the page of boxes that were check before so I know which were open, but I'm going to uncheck all of them to see what difference that makes....any other comments?

    LVL 10

    Accepted Solution

    I was referring to ShieldsUP not SpinRite... ShieldsUP is free and will try to connect  to your PC  on any open ports... and it will give you a list of the was that are open

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    6 Surprising Benefits of Threat Intelligence

    All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

    We have adopted the strategy to use Computers in Student Labs as the bulletin boards. The same target can be achieved by using a Login Notice feature in Group policy but it’s not as attractive as graphical wallpapers with message which grabs the att…
    HOW TO REMOTELY CLEAN MEROND.O WITH ESET SILENTLY PROBLEM       If you have the fortunate luck to contract the Merond.O virus on your network, it can be quite troublesome to remove as it propagates to network shares on your network. In my case, the …
    This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
    With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    9 Experts available now in Live!

    Get 1:1 Help Now