Abuse Melding

Je hebt een klacht over de onderstaande posting:

07-09-2004, 11:32 door Anoniem

Windows Worms Doors Cleaner v1.4.1: Most of the worms, in particular the most famous, use known vulnerabilities in Windows services which are enabled by default and that often can't be disabled via the OS's configuration. Even with these services patched with Microsoft security fixes, they are still exposed to the Internet at large ready to be exploited by the next exploit. These ports/services on client side are : * DCOM RPC (listen on port 135) MS03-026 * RPC Locator (port 445) MS03-001, MS04-011 * NetBIOS (ports 137/138/139) MS03-049 * UPNP (port 5000) MS01-059 * Messenger service (uses RPC/NetBIOS ports) MS03-043 Hier te downloaden: http://www.firewallleaktester.com/wwdc.htm

Beschrijf je klacht (Optioneel):

captcha