Results 1 to 4 of 4

Thread: Remote Access?

  1. #1
    ARS
    Guest

    Post Remote Access?

    I am using ZA, and BlackIce...my blackice picked up a info that goes like this:

    Time: 2001-01-01 18:48:13,
    Attack: UDP port probe,
    Intruder: rock.pythonvideo.com,
    Count: 8

    IP: 207.35.170.10
    DNS: rock.pythonvideo.com
    ----It also says:
    [Scan] Attacker attempts to see if a particular port is open for remote access.


    Now what I need to know is, should I be concerned over this?
    I ran NAV 2 times already...and run it normally twice a week. But nothing was picked up...


  2. #2
    TonyT
    Guest

    Post

    Canadian School Project (NETBLK-GRICS-CA) GRICS01
    207.35.0.0 - 207.35.255.0
    Python Communication Inc. (NETBLK-PYTHON2000-CA) PYTHON2000-CA
    207.35.169.0 - 207.35.174.255

    Script kiddies foolin around. No need to worry, they're just probing for vulnerable machines. Click that ADVICE button on BID.

  3. #3
    ARS
    Guest

    Post

    When I click advICE...it takes me to my sisters and brother AIM connection and tell me about some hyperlink stuff...this has happened when I click on ZA's things too.
    How do I get rid of that of happening?

  4. #4
    TonyT
    Guest

    Post

    Man, are you saying that when you click the hyperlink buttons in those apps that you end up on AIM channel? They are supposed to take you to a webpage on the manufacturer's site! Are you using a cracked BID?

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •