
| Internet Connection Security for Windows Users |
| by Steve Gibson, Gibson Research Corporation |
![]() Here's another scanner. This one uses a single window but otherwise functions similarly. An IP scanning range is provided then the "Scan" button is pressed. A standard Windows "tree view" of machines appears, labelled by their IP address. The tree view can be expanded as shown. The program's accompanying help file tells us that blue arrow icons mean that the share is completely "open" for total access. Clicking an icon prompts for the local drive to use for mapping the contents of this remote drive into the intruder's local computer. At which point the remote drive's contents may be examined, altered, copied, deleted, etc.
to return to the page you were viewing. |