NOW SpinRite 6.1 – Fast and useful for spinning and solid state mass storage!



Internet Connection Security for Windows Users
by Steve Gibson, Gibson Research Corporation
For Further Reading:
"You mean there's more?!!!" — If you've somehow made it this far, I would understand if you never wanted to read anything else ever again! Right now you probably know way more about establishing and maintaining the security of your computer over the Internet than you ever wanted to. But, sadly, as you have seen on these pages, the inherent security of our Windows-based personal computers is SO POOR that protecting yourself and your personal and private data is almost entirely your responsibility.

In a recent story in InfoWorld Magazine, Microsoft's official position appears to be that users would "rather just have everything work" than have more secure systems. But security experts argue that Microsoft has a responsibility to provide better default security, even if it takes more time and money to develop better products with greater security.

On this page I have assembled a random collection of interesting and useful resources relating to the Internet and security. I think you'll find many of them worthwhile. And if you know of any good links I've missed I would love to know!  I'll add them immediately:

Who is Attacking You?
Any Internet monitor will alert you when someone is probing or attacking your computer. (And you're going to be really surprised how much of that is going on!) But this raises the question is: "Who is this attacker?" It's quite frustrating to have nothing but the attacker's IP address.
   This online database accepts any IP address then displays the official Internet records governing the blocks of IP addresses which include the IP address you supply. It won't generally tell you anything about the specific individual, but it usually provides some idea of the person's location and affiliations.

To make it even easier, I created a field right here
that you can fill-in to find out about any IP address:

  

Use your browser's BACK button to return.

Internet "Sleuthing" Resources:
   http://users.rcn.com/rms2000/sleuth/index.htm

Security Sites:
   www.sans.org
   www.sans.org/digest.htm
   packetstorm.securify.com/index.shtml
   www.antionline.com/index.html

Microsoft's Security Advisor Site
   www.microsoft.com/security

Popular Hacker Hangouts
   L0pht.com
   Insecure.org
   Technotronic.com
   Nmrc.org
   CultDeadCow.com
   KevinMitnick.com
   2600.com
   Phrack.com
   Rootshell.com
   HackerNews.com
   Hackers.com
   Attrition.org
   Apostols.org

In The News
   10/03/99 — "HacK, CouNterHaCk" — New York Times Magazine
   10/04/99 — Home hackers — U.S. News Online
   10/04/99 — Hack Attacks Spreading — P.C. Magazine
   10/05/99 — Cybercrooks Breach Borders Of Cyberspace — Reuters

What TCP/IP ports do Trojan horses use?
   www.simovits.com/trojans/trojans.html (The most comprehensive list!)
   www.sans.org/newlook/resources/IDFAQ/oddports.htm

Standard TCP/IP "well known" Port Numbers
   www.iana.org/assignments/port-numbers

Check out this cool "BrowserSpy" page!

    www.gemal.dk/browserspy/

To continue, please see: Public Forum

You are invited to browse these pages for additional information:

1  Shields UP! Home 
5  Network Bondage 
9  Public Forum 
2  Explain this to Me! 
6  Evil Port Monitors 
10  Be Notified 
3  Am I in Danger? 
7  Personal Firewalls 
11  FAQ 
4  What Can I Do? 
8  Further Reading 
12  Site Evolution 

Jump to top of page
Gibson Research Corporation is owned and operated by Steve Gibson.  The contents
of this page are Copyright (c) 2024 Gibson Research Corporation. SpinRite, ShieldsUP,
NanoProbe, and any other indicated trademarks are registered trademarks of Gibson
Research Corporation, Laguna Hills, CA, USA. GRC's web and customer privacy policy.
Jump to top of page

Last Edit: Aug 04, 2006 at 21:14 (6,617.18 days ago)Viewed 7 times per day