<blockquote><hr>BlueEyedFox wrote:
It uses Valve Corportations which uses Steam which I was just using before I restarted my computer. Problem solved. Thanks.

So very often the user who just got a firewall with detailed logging will suddenly see so many new/strange connections and ask what is going on.
Suddenly there are unusual ports and IPs involved, new protocols that were never realised before. Not to mention the processes involved.
For the very most part, all of these connections are very normal and have no threat issues what so ever.
The connections were always ongoing long before the user got a notice of the connections. It is just when the user finally takes a look at the connections, the user begins to wonder exactly what is happening.

This is especially true for users with P2P,VPN, ftp, iis, online games, online site interaction, messengers, opened ports, etc, since there is extra inbound traffic occuring at different levels.

Checking the ports and the protocols and the IPs will aid in following/tracking these events and either conclude it is normal or an attempt.
Most will finally conclude it is safe and there should be no worries.

For the very most part, the average home user is not at risk from malicious attempts to gain entry of the PC. The attempts to gain entry is for the most part aimed at servers and enterprise - this is where the money and the fame is. There is no money/profit or fame from hacking some home user.

Even users with no hardware firewall in front of the PC will see numerous dropped connections attempts at various ports and often ICMP connection attempts. A lot of this is normal internet traffic . Sometimes it is actually some ***** attempting to find open ports of a server/firewall or attempting to open the port(s). Again these attempts will fail for the home user's PC - these ports will never open since the ports often do not apply to the home user.
A home PC even with no hardware firewall and either using just a software firewall or a nicley hardened PC will never have open ports.
Just closed and stealthed ports status.

The trouble is most home users have no idea as how to close all the ports of the PC and properly secure the PC. The simplest solution is either get a hardware firewall or get a software firewall. Or get both a hardware firewall and a software firewall.
To be honest, I myself use a hardware firewall, two routers (both doing SPI/NAT) and the ZA Antispyware firewall. Plus a dedicated IP blocker (over 2.5 billion IPs blocked) and a desktop proxy web filtering (web content and more sites, etc). Seems like I got the internet connections well covered. Plus the hardware filtering of the network connection is fully used. Plus the windows is fully/properly secured and there are no open ports by default.

Usually a hacker will just ignore the home user and move on to the green pastures of enterprise/business/governmanet networks and servers.
How does the home user become the victim?
What happens is the home user opens a bad email or attachment or downloads/installs some malware. Or has the PC running without updates or improperly secured. Then the home owner will get owned.
Not because of some hacker or cracker attempts, but because the home user actually did it to themsleves. Once the home user gets owned, many things are possible. But one thing for sure - a owned PC is no longer the user's PC, but now belongs to the new remote owner.


Message Edited by Oldsod on 05-18-2008 06:23 AM