Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Gemäß Ihres derzeitigen Berichtsstils sind die Grundlinien Vergleiche: | Aktiviert |
Es konnte keine Überprüfung gefunden werden, um einen Vergleich gemäß den aktuellen Grundlinien Regel durchzuführen. |
Kategorie | Hoch | Mittel | Niedrig | Sonstige |
Fedora Local Security Checks | ||||
SuSE Local Security Checks | ||||
Web application abuses | ||||
Debian Local Security Checks | ||||
Ubuntu Local Security Checks | ||||
Huawei EulerOS Local Security Checks | ||||
General | ||||
CentOS Local Security Checks | ||||
Red Hat Local Security Checks | ||||
Mandrake Local Security Checks | ||||
Windows : Microsoft Bulletins | ||||
Product detection | ||||
Gentoo Local Security Checks | ||||
FreeBSD Local Security Checks | ||||
Denial of Service | ||||
Oracle Linux Local Security Checks | ||||
CGI abuses | ||||
Databases | ||||
Amazon Linux Local Security Checks | ||||
Policy | ||||
CISCO | ||||
Web Servers | ||||
Buffer overflow | ||||
Slackware Local Security Checks | ||||
Windows | ||||
Conectiva Local Security Checks | ||||
IT-Grundschutz-deprecated | ||||
Service detection | ||||
Backdoors | ||||
Mageia Linux Local Security Checks | ||||
Turbolinux Local Security Tests | ||||
Default Accounts | ||||
Mac OS X Local Security Checks | ||||
FTP | ||||
Gain a shell remotely | ||||
IT-Grundschutz | ||||
Nmap NSE net | ||||
Trustix Local Security Checks | ||||
Nmap NSE | ||||
JunOS Local Security Checks | ||||
F5 Local Security Checks | ||||
Huawei | ||||
Remote file access | ||||
Gain root remotely | ||||
SMTP problems | ||||
Privilege escalation | ||||
Misc. | ||||
IT-Grundschutz-15 | ||||
SSL and TLS | ||||
AIX Local Security Checks | ||||
CGI abuses : XSS | ||||
VMware Local Security Checks | ||||
Malware | ||||
RPC | ||||
Palo Alto PAN-OS Local Security Checks | ||||
FortiOS Local Security Checks | ||||
Citrix Xenserver Local Security Checks | ||||
Windows : User management | ||||
SNMP | ||||
Useless services | ||||
Peer-To-Peer File Sharing | ||||
Firewalls | ||||
HP-UX Local Security Checks | ||||
Settings | ||||
Brute force attacks | ||||
Compliance | ||||
Port scanners | ||||
Finger abuses | ||||
Credentials | ||||
NIS | ||||
Solaris Local Security Checks | ||||
Gesamt: | 0 | 0 | 0 | 0 |
Online Bestellformular
Dieser Bericht ist eine Zusammenfassung einer Sicherheitsprüfung, die auf Ihrem System durchgeführt wurde. Sie hatten 0 hohe Risiko und 0 mittlere Risiko Anfälligkeiten, die nicht im obigen Bericht aufgedeckt wurden. Um Details zu diesen Anfälligkeiten und wie Sie behoben werden können einzusehen, abonnieren Sie bitte einen der unter aufgelisteten Services. |
Port | Protokoll | Wahrscheinlicher Service |
135 | TCP | loc-srv |
Defined as a "Location Service" in RFC1060, pre-SP3 versions
of Windows NT were susceptible to a denial of service attack
on this port that would cause NT's rpcss.exe process to consume
all available CPU cycles. The (easiest) recovery from this
attack is to reboot your machine.
You should do one of several things: a) upgrade/patch your operating system to make sure it is not susceptible to this attack; b) firewall your system so that port 135 is not visible from the internet c) configure your router to block port 135; d) Install one of several monitoring packages on your PC that block this denial of service. | ||
139 | TCP | netbios-ssn |
Port 139 is used on Windows machines for NetBios name resolution,
WINS, etc. A problem with older unpatched versions of Windows is that
they are susceptible to receipt of Out-Of-Band (OOB) data. This means
that someone can remotely send you OOB data on port 139 and can cause
numerous problems on your machine, including but not limited to
machine lockups, blue screens, loss of internet connection.
You should do one of several things: a) upgrade/patch your operating system to make sure it is not susceptible to this attack; b) firewall your system so that port 139 is not visible from the internet c) configure your router to block port 139; d) Install one of several monitoring packages on your PC that block this denial of service. | ||
Anzahl der bei diesem Skan festgestellten offenen Ports:2 | ||