Ok, I went to www.grc.com
(Shield's Up) and tested both Common Ports and the File Sharing. The results were disasterous!!!! See the results below. This IS NOT good.
File Sharing Test Results:
Preliminary Internet connection established!
Your computer has accepted an anonymous connection from another machine it knows nothing about! (That's not good.) This ShieldsUP! web server has been permitted to connect to your computer's highly insecure NetBIOS File and Printer Sharing port (139). Subsequent tests conducted on this page, and elsewhere on this website, will probe more deeply to determine the extent of this system's vulnerability. But regardless of what more is determined, the presence and availability of some form of Internet Server HAS BEEN CONFIRMED within this machine . . . and it is accepting anonymous connections!
The rest of this website explains the implications and dangers of your present configuration and provides complete and thorough instruction for increasing the security of this system. At the moment, any passing high speed Internet scanner will quickly spot this computer as a target for attack. (When this page has completely finished displaying, you might wish to sneak a quick peek at these two pages to see what lies ahead at this website: Scanner1 & Scanner2)
The phrase you must remember is:
"My port 139 is wide OPEN!"
Remotely connected to your NetBIOS system!
This computer is exposing its internal NetBIOS networking protocol over the Internet. This is called "NetBIOS over TCP/IP" or "NBT" for short. This is a security risk because it gives anyone in the world a point of entry to your system. Connecting to your computer is NOT something that anyone on the Internet should be allowed to do . . . but we've just done it! The following pages provide information about the consequences and your options for increasing your system's security.
Your computer's name is: LOCALHOST / Samba Server 2.2.7a.
This is an example of some of the information about you and your computer that is leaking out onto the Internet and is openly available to anyone. Such information is commonly used as a starting point for guessing your name and/or your passwords and learning more about who you are.
Your computer is exposing 2 shared resources!
The following 2 "shares" (file system directories or printers) are being actively exposed and advertised by the Hidden Internet Server now running inside your computer:
Your System's Internet Connection Security Synopsis:
This system's silent NetBIOS over TCP/IP (NBT) Internet Server is actively advertising its existence across the Internet and thus inviting equally silent connection and intrusion into your system. We were just now able to connect to your computer and establish a dialog with it, asking for its name and other information. That is the first step in breaking into a system. Automated "hacking tools" already exist to scan the Internet looking for computer targets exactly like this one . . . and then silently cracking any passwords you may be using to "protect" those resources.
All of your system's shared resources are password protected. That's good! But as you can see, their names and the fact of their existence is still completely exposed and dangling out there on the Internet for everyone to see. This could cause intruders to wonder what they might contain . . . and what their passwords might be. Sophisticated password cracking utilities are readily available to anyone who might be curious about the contents of these exposed shared resources.
Your computer's private resources are being served
up to the entire Internet by software which identifies
itself as: Microsoft Windows Network
Common Port Test Results:
GRC Port Authority Report created on UTC: 2004-08-22 at 23:01:02
Results from scan of ports: 0, 21-23, 25, 79, 80, 110, 113,
119, 135, 139, 143, 389, 443, 445,
1002, 1024-1030, 1720, 5000
3 Ports Open
23 Ports Closed
0 Ports Stealth
26 Ports Tested
NO PORTS were found to be STEALTH.
Ports found to be OPEN were: 80, 139, 443
Other than what is listed above, all ports are CLOSED.
TruStealth: FAILED - NOT all tested ports were STEALTH,
- NO unsolicited packets were received,
- A PING REPLY (ICMP Echo) WAS RECEIVED.
Now, what should I do to improve my results? I set the built-in Firewall to "High" when it did these tests.
On my Windows 2000, it always showed everything as good all across the board.
What services do I need to disable?