![]()  | 
 Home ▼ Bookkeeping 
	
    Online ▼ Security 
	Audits ▼ 
 Managed 
	DNS ▼ 
	    About
	    Order
	    FAQ
	    Acceptable Use Policy
	    Dynamic DNS Clients
	     
    Configure Domains Dyanmic DNS Update Password Network 
	Monitor ▼ 
	    Enterprise Package
	    Advanced Package
	    Standard Package
	    Free Trial
	    FAQ
	    Price/Feature Summary
	    Order/Renew
	    Examples
	     
    Configure/Status Alert Profiles  | ||
| Report ID | 2 | 
| View Created On: | Jan 1, 1970 00:00 GMT | 
| Host Address(es): | X.X.X.X | 
| Category | High | Med | Low | Other | 
| Fedora Local Security Checks | ||||
| SuSE Local Security Checks | ||||
| Huawei EulerOS Local Security Checks | ||||
| Ubuntu Local Security Checks | ||||
| Debian Local Security Checks | ||||
| Web application abuses | ||||
| General | ||||
| Mageia Linux Local Security Checks | ||||
| CentOS Local Security Checks | ||||
| Red Hat Local Security Checks | ||||
| Windows : Microsoft Bulletins | ||||
| Product detection | ||||
| Mandrake Local Security Checks | ||||
| Denial of Service | ||||
| Gentoo Local Security Checks | ||||
| FreeBSD Local Security Checks | ||||
| Oracle Linux Local Security Checks | ||||
| Slackware Local Security Checks | ||||
| openSUSE Local Security Checks | ||||
| Databases | ||||
| Web Servers | ||||
| Policy | ||||
| CGI abuses | ||||
| Amazon Linux Local Security Checks | ||||
| CISCO | ||||
| Buffer overflow | ||||
| Windows | ||||
| Mac OS X Local Security Checks | ||||
| Conectiva Local Security Checks | ||||
| IT-Grundschutz-deprecated | ||||
| Default Accounts | ||||
| Backdoors | ||||
| Service detection | ||||
| Turbolinux Local Security Tests | ||||
| Privilege escalation | ||||
| FTP | ||||
| Gain a shell remotely | ||||
| IT-Grundschutz | ||||
| Nmap NSE net | ||||
| Trustix Local Security Checks | ||||
| Nmap NSE | ||||
| Huawei | ||||
| JunOS Local Security Checks | ||||
| F5 Local Security Checks | ||||
| SMTP problems | ||||
| Remote file access | ||||
| Gain root remotely | ||||
| Misc. | ||||
| SSL and TLS | ||||
| IT-Grundschutz-15 | ||||
| AIX Local Security Checks | ||||
| CGI abuses : XSS | ||||
| VMware Local Security Checks | ||||
| Malware | ||||
| RPC | ||||
| Palo Alto PAN-OS Local Security Checks | ||||
| FortiOS Local Security Checks | ||||
| Citrix Xenserver Local Security Checks | ||||
| Windows : User management | ||||
| Useless services | ||||
| SNMP | ||||
| Peer-To-Peer File Sharing | ||||
| Firewalls | ||||
| HP-UX Local Security Checks | ||||
| Compliance | ||||
| Settings | ||||
| Brute force attacks | ||||
| Finger abuses | ||||
| Port scanners | ||||
| Credentials | ||||
| NIS | ||||
| Solaris Local Security Checks | ||||
| Totals: | 0 | 0 | 0 | 0 | 
On-line Order Form 
This report is a synopsis of a security audit done on your system. You had 0 High Risk and 0 Medium Risk vulnerabilities that were not disclosed in the above report. To view the details of these vulnerabilities and solutions to fix them, please subscribe to one of the services below.  | 
| Port | Protocol | Probable Service | 
| 
	 | ||
| 135 | TCP | loc-srv | 
| 
Defined as a "Location Service" in RFC1060, pre-SP3 versions
of Windows NT were susceptible to a denial of service attack
on this port that would cause NT's rpcss.exe process to consume
all available CPU cycles. The (easiest) recovery from this
attack is to reboot your machine.
 You should do one of several things: a) upgrade/patch your operating system to make sure it is not susceptible to this attack; b) firewall your system so that port 135 is not visible from the internet c) configure your router to block port 135; d) Install one of several monitoring packages on your PC that block this denial of service.  | ||
| 139 | TCP | netbios-ssn | 
| 
Port 139 is used on Windows machines for NetBios name resolution,
WINS, etc. A problem with older unpatched versions of Windows is that
they are susceptible to receipt of Out-Of-Band (OOB) data. This means
that someone can remotely send you OOB data on port 139 and can cause
numerous problems on your machine, including but not limited to
machine lockups, blue screens, loss of internet connection.
 You should do one of several things: a) upgrade/patch your operating system to make sure it is not susceptible to this attack; b) firewall your system so that port 139 is not visible from the internet c) configure your router to block port 139; d) Install one of several monitoring packages on your PC that block this denial of service.  | ||
| Number of open ports found by port scan:2 | ||