Bitdefender internet security 2013 portscan




















We have people working in shared locations and I see these:. Looking at WUDO post, it could be that Win10 update is configured to try to reduce the bandwidth on a few machines.

Sign up to join this community. The best answers are voted up and rise to the top. Stack Overflow for Teams — Collaborate and share knowledge with a private group. Create a free Team What is Teams? Learn more. Port Scan Detected and Blocked! Asked 7 years, 1 month ago. Active 2 years, 6 months ago. Viewed 49k times. I have Bitdefender Total Security How to block port scanning by hackers?

I have heard of NMap but I am not network specialist. Improve this question. Omar Nofl Omar Nofl 31 1 1 gold badge 1 1 silver badge 4 4 bronze badges.

Not a permanent solution, nor an answer to your question, but call your ISP and ask them to change your IP address, and see if the attack goes away. A few important questions: 1. Are you behind a router, or is your computer directly connected to a modem?

If you are behind a router, have you verified that your router's firewall is enabled? Are you using WiFi? If so, is it protected with WPA2 and a strong passphrase?

We do not give recommendations for products. Nmap will not prevent scanning, it is itself a scanner. Just because the IP is from your country doesn't mean it is not a robot or virus. Show 4 more comments. Active Oldest Votes. Improve this answer. According to the OP the computer is behind a router, so random port-scanning bots should not be getting through.

Depending on the type of router, it may just be putting them on the same network as his cable modem and his cable modem may just be handing direct IPs to each computer on the network. Protection against network-based attacks that try to exploit security vulnerabilities on your system is a feature often associated with a firewall component. With Bitdefender, that Network Threat Protection component comes with the antivirus.

Firewall protection isn't worth much if a zero-day malware program missed by the antivirus can reach in and turn it off. I found no way for a program to simply flip a switch in the Registry to turn off protection no big surprise; that's an old trick that hardly ever works anymore. Loading up a view of installed Windows services, I found 10 associated with Bitdefender. I found I could stop and disable the VPN service, parental controls, and something called Product Agent Service, but the Stop link didn't even appear for the important ones.

When I tried to set the startup status for those important services to Disabled, I just got an "Access is denied" error. Spam filtering becomes steadily less significant as more people get mail through a web-based service like Gmail or Yahoo that filters out spam.

But if you use another provider, perhaps a legacy ISP that doesn't filter spam, you need a local antispam to protect your inbox. The spam filter integrates with Microsoft Outlook and Mozilla Thunderbird, adding a toolbar that lets you flag spam messages that got past the filter or report valid messages that it filtered in error.

You can also click to put a sender on the Friends or Spammers list. Those using a different email client must create an email rule to divert marked spam messages into their own folder, and manage the Friends and Spammers lists from Bitdefender's spam filter settings. If you use the toolbar to flag a mis-categorized message, Bitdefender asks for permission to send that message to the cloud for analysis, thereby improving the filter.

I suggest configuring it so it always sends missed spam messages for analysis, but never sends valid messages that were mismarked as spam. Do you really want Bitdefender analyzing your personal email? ZoneAlarm's spam filter features many pages of configuration choices. With Bitdefender, there are next to no settings beyond the Friends and Spammers lists, which is preferable for most users.

You might consider setting it to block emails using Cyrillic or Asian character sets, assuming you never get legitimate mail using those character sets. As with parental monitoring in most modern parental control software, you manage profiles for each child no limit on how many from the online console. To start with parental control, you log into Bitdefender Central and create a profile for your child. The profile includes name, birth date, and an optional photo.

Next, you identify the child's devices. It's important to do this before working on settings because some of the settings rely on information gathered from those devices. On a Windows device with Bitdefender installed, it's a snap.

Select Devices from the child's profile, choose the active device, select a user profile, and click Save. You can now install parental monitoring on a device without requiring the entire Bitdefender suite. Installed on a Mac, Bitdefender controls the whole device, not just one user account. From the device in question, log into Bitdefender Central, select the child's profile, choose devices from the three-dot menu, and click Add Device. To protect an Android device, you download the parental component from the app store and log in to your account to associate it with a child profile.

During installation, you must give it several high-end permissions: Accessibility, Device Administrator, and Usage Access. Take care during this process, as it needs these as well as more mundane permissions to function correctly. Installation on an iOS device is similar; download the app, associate it with a profile, and give it all requested permissions.

Back in the online console, click a child profile and click Websites. Bitdefender can block access to sites in more than 40 categories, some clearly inappropriate, some more innocuous. Based on the birthdate you entered for the child, it sets an initial selection of categories for blocking. For my imaginary ten-year-old, the blocked categories included Pornography, Mature Content, and Web Proxy. The list of categories exhibits no particular order.

On the Activity page for each child, you get an overview of what's been happening. It shows recent location check-ins, apps used on each device, most-visited websites, blocked website categories, and time spent on each device. Click Screen Time to set limits on the child's use of devices. As with parental control in F-Secure Safe , you can define restricted access timespans and separately put a daily cap on device use.

However, where F-Secure simply defines a single span for Bedtime, Bitdefender lets Bedtime be just the start. You can define multiple spans, and configure each of these to take effect on specific days of the week.

In my opinion, the common scheduling grid, with hours crossing days, would be an easier way to manage daily schedules. You can also click the Pause Activity button at the top of the overview page. At its simplest, Child Location lets you locate your child's mobile devices on a map. The mobile parental control app also lets the child actively check in on arriving at a location.

You can also define Safe and Restricted areas. You name the area, click the center on a map, and set a radius from m to m. For Safe areas, you can request that the child check in on arrival.

If the child enters a Restricted area, parents get a notification. Kaspersky offers a similar geofencing feature, with the added fillip that parents can assign times to locations. For example, parents can get notified if it's school time, but the kid isn't at school. When you open the Applications page, you see a list of the child's devices, along with the applications Bitdefender detected on the selected device, and the amount of time spent on those applications.

You can also choose to block specific apps. Past editions included the ability to block unwanted contacts, or block callers whose caller ID is suppressed. To test the content filter, I tried opening a variety of inappropriate websites.

That remains true, but by observation, Brave, Edge, and Opera are not among the supported browsers. Nor, of course, is my hand-coded example. If it's not that, then something is doing the stealthing for you, such as a router with a built-in firewall.

Hi Le Flake! That's the problem, I disabled the ICF firewall too. I called up my ISP and they say they don't have any firewalls for users either. There is no hardware firewall either, because it's a single PC connected thru a simple modem to the world thru my ISP. However, I don't know if there is any type of hacking possibility. Do you have any ideas? Now I have double problem, I also wanna know why port ,, are getting used?

Can't I avoid these ports altogether? What does my ISP has to do with these ports? You put in firewall rules to stop inbound and outbound TCP and UDP traffic for external IP addresses for the ports used by svchost, if those ports worry you. It's very important to find out why ShieldsUp is reporting your ports as stealthed if you are testing with your firewalls down. As you don't know what is causing this stealthing to occur, you may not know when this stealthing phenomenon disappears, leaving you totally exposed.

Don't disable all of your firewalls - it's safer to leave one running and adjust its firewall settings to trust GRC probes from Could you also tell us: o The software firewall you're using? I did as you suggested i. This time the test failed. I checked by disabling the firewall too, the test failed again, which means the things have returned back to normal. Port,, were shown open.

However, I have a rule from them in my firewall, which stops communication with any IP. The time you did a test on my IP was then when I must have been using a firewall. I had not created a rule for allowing packets from GRC before this. About my IP, I will tell you the whole thing. At present, I am experimenting with various firewalls. Before using Zonealarm, I was using Norton. This was when I reinstalled my OS. In Norton, I think , there were some automatic rules for port , which kept giving alerts without opening any webpage.

This was my first instance of logging on to net after reinstalling software. I had read the information about at GRC where it was mentioned that these ports were the first one's used after installation of new OS, and a good firewall should take care of these ports cleverly. In Zonealarm, there were some alerts about svchost. I don't think it could be any other user because at that time I had hardly connected to the internet after reinstalling software.

However, now I find port are not only being used by svchost. These ports are becoming intriguing. Can you suggest me some resource where I can get detailed info about them.

Basically, what exactly is the purpose of these ports? About the Questions 1 I am using Zonealarm pro at present. Some thoughts that may help: Norton Firewalls should be uninstalled, not just disabled when you wish to test other firewalls like ZA. Likewise for ZA if you want to test Norton. Disabling a Norton Firewall doesn't stop the firewall from configuring itself and running its proxies in the background.

Other people here have reported strange results when there are two firewalls trying to proxy your network connection. Hi Le Flake, I think I have got answers to my questions. Most of the times you get answer from other people experiences, same seems to be the case with me.

Thanks a lot.



0コメント

  • 1000 / 1000