How to Protect Your Network Using these Network Security Procedures and Tips
Ports to be concerned about are 3389 which is terminal services ports. If you do not have a firewall in place blocking public IP address from forwarding to private IP address using this port then you will want to call a security professional right away. Other ports to be concerned about are 139 which gives access to network shares.
Another area of concern is the SMB or the (Server Message Block) protocol. This protocol is used among other things for file sharing in Windows NT/2000/XP. In Windows NT it ran on top of NetBT (NetBIOS over TCP/IP), which used the famous ports 137, 138 (UDP) and 139 (TCP). In Windows 2000/XP/2003, Microsoft added the possibility to run SMB directly over TCP/IP, without the extra layer of NetBT. For this they use TCP port 445. Again all these ports should remain in the private network and your firewall should block access.
Note: The NETSTAT command will show you whatever ports are open or in use, but it is NOT a port scanning tool! If you want to have your computer scanned for open ports see this page instead (link will follow shortly).
C:>netstat -an |find /i "listening"
TCP 0.0.0.0:135 0.0.0.0:0 LISTENING
TCP 0.0.0.0:445 0.0.0.0:0 LISTENING
TCP 0.0.0.0:1723 0.0.0.0:0 LISTENING
TCP 0.0.0.0:3389 0.0.0.0:0 LISTENING
TCP 127.0.0.1:1026 0.0.0.0:0 LISTENING
TCP 127.0.0.1:4664 0.0.0.0:0 LISTENING
TCP 192.168.50.127:139 0.0.0.0:0 LISTENING
TCP 192.168.100.193:139 0.0.0.0:0 LISTENING
The netstat command will also show you who is active on your computer. This will show you what spyware or trojan horses that may have installed on your machine.
Active Connections
Proto Local Address Foreign Address State
TCP argonas:epmap argonas:0 LISTENING
TCP argonas:microsoft-ds argonas:0 LISTENING
TCP argonas:pptp argonas:0 LISTENING
TCP argonas:3389 argonas:0 LISTENING
TCP argonas:1026 argonas:0 LISTENING
TCP argonas:2617 localhost:2618 ESTABLISHED
TCP argonas:2618 localhost:2617 ESTABLISHED
TCP argonas:2619 localhost:2620 ESTABLISHED
TCP argonas:2620 localhost:2619 ESTABLISHED
TCP argonas:4664 argonas:0 LISTENING
TCP argonas:netbios-ssn argonas:0 LISTENING
TCP argonas:2958 an-in-f104.google.com:http ESTABLISHED
TCP argonas:3011 va-in-f104.google.com:http TIME_WAIT
TCP argonas:3014 eo-in-f147.google.com:http ESTABLISHED
TCP argonas:3081 unknown.xeex.net:http TIME_WAIT
TCP argonas:3104 unknown.xeex.net:http ESTABLISHED
TCP argonas:3903 web1.allaboutsingles.com:http CLOSE_WAIT
TCP argonas:4449 static-71-116-207-166.lsanca.dsl-w.verizon.net:pptp ESTABLISHED
TCP argonas:4762 va-in-f104.google.com:http CLOSE_WAIT
TCP argonas:netbios-ssn argonas:0 LISTENING
TCP argonas:2939 192.168.100.202:1025 ESTABLISHED
TCP argonas:2957 exchange01.intercore.local:1419 ESTABLISHED
Once you have locked down all ports then you must be concerned with internal security. No one in your organization will be allowed to talk to anyone about any secure information. Even giving out there email address. Next use devices like honey pots, barracuda spam appliance, Symantec anti-virus hardware and software. A properly configured network can allow your workers to work and disallow hackers to work.
Related Tags: network security
Intercore has been providing network security consulting for years, even before it was popular. For more information go here Computer Network Security Consultant Los Angeles
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- Never Undervalue Secure Backups
The Internet can be a very intimidating place. It is full of information, and every day new busi - Lack of Internet Privacy - One Step Away from Identity Theft
Four Reasons to Use Privacy Software Unless you are a spammer, hacker, terrorist, or other such - Site Security Issues Abound
It has happened web wide and it has happened to the best of the best - NASA, DOD, Google, Micros - Online Security: How Secure are You When You Get on the Internet?
Internet technology specialists widely agree that security is becoming the primary concern of th - Software Engineering Standards Providing Industry Integrity
Software engineering is a relatively new career field in technology today in comparison to other - Protect Your E-mail by Obfuscatoin
E-mail harvesting is the process of obtaining lists of e-mail addresses from the internet. This is u - Antispyware Host File - Protect Your Computer Now With This Simple Fix
An antispyware host file is a simple defence mechanism against rogue sites that are out to get you a - What Key Features Make The Best Spyware Removal Programs?
Range Of FeaturesThe best spyware removal programs should combine multiple features so that you get - Online Job Scams and Identity Theft-What Every Job Hunter Needs to Know
There are three main types of common online job scams:1. Phony Job Offers-With this type of scam, In - Spybot Sickness - Spyware Flue
When we talk about spyware symptoms, we talk about both how you get spyware and what the symptoms of
Most viewed articles in this category:
- Parental Control Software - How Will It Help My Family?
Parental Control Software such as Safe Eyes, is a set of tools that allows parents to control what o - Designing IE Exclusive Sites Is Counterproductive And Puts Your Visitors At Risk
Excuse me for being so forthright, but designing a web site exclusively for a specific browser is do - Mind the letters and words in your password.
Radhika Venkata (c).1. Don't choose predictable passwords like asending or desending numbers or lett - Safe Password Tips for Better Computer Security
With so many online accounts to manage, most people tend to use the same password for everything. M - Minimising Credit Card Fraud - For Online Retailers
Well organized criminal organizations steal credit card numbers in many different ways (virus progra - Fraud Prevention Tips
Current areas where mail order, telephone order, and Internet fraud are most prevalent include:* Wes - Money Scams: How to Avoid Getting Ripped Off
Scams take many forms: overseas lotteries, get-rich-quick schemes, work-from-home jobs and hundreds - Protecting Your Websites From Search Engines
There are a great number of scenarios in which you should be protecting your websites from the searc - The Best Internet Privacy Software
Detect, Protect, Dis-infect, Reject, Delete, then - RepeatThe best internet privacy software isn't a - The Most Effective Spyware Removers
There are a number of things you need to look for when you are seeking the most effective spyware re