Free to help you check Network Security

Source: Internet
Author: User

Whether you have installed Norton AntiVirus software or not, you can log on to the http://security.symantec.com/sscv6/default.asp? Productid = globalsites & langid = cs & venid = sym page to check the network security of the system.

I. System Requirements

To get a diagnosis from the cyber security clinic doctor, you don't have to pay any price. Of course, you have certain requirements on the browser version, for example, it must be Microsoft Internet Explorer 5.0 or later, or Netscape 4.5 or later. In addition, although the security clinic does not require scripts, the script can enhance the user experience when using the site. If you scan the system on the client, you must enable the script, because the ActiveX control analysis system will be used during scanning,

2. Conduct an expert clinic for the System

After entering the address, click the "enter" button to go to the "Security Scan" Page. Click the "Start" button to first detect the IP address of the local machine, then, the system starts to test the computer's exposure to hackers and other online threats. The test consists of three items:
Hacker exposure check: test whether the TCP port has an unauthorized Internet connection. It mainly tests whether common ports of applications are opened, closed, or hidden. The detected ports include 21 (FTP) 22 (SSH), 23 (Telnet), 25 (SMTP), 79 (Finger), etc. The opened port will respond to port probing, which is very dangerous. Although the closed port is not open to attacks, hackers can still use the closed port to detect the existence of your computer, therefore, it may be used as an attack target. The hidden ports are the safest.

Windows vulnerability check: test whether a hacker can see basic information such as the network tag of your computer.

Trojan Horse check: attempts to access your computer using common Trojan Horse methods. It mainly checks whether common ports of the Trojan program are opened, closed, or hidden. The detected ports include 31 (Master Paradise), 41 (DeepThroat), 58 (Dmsetup), 146 (FC Infector), 531 (RASmin), etc. Obviously, the opened port is very dangerous, they are a simple and easy channel for hackers. Although closed ports are not open to attacks, hackers can still use closed ports to detect the existence of your computer, thus, the attack target may be taken as the target. The Hidden Port is the safest, because after the port is hidden, the hackers who scan the Internet to find the target will be invisible.

The entire scan process requires about 3 ~ In about 8 minutes, a progress will be displayed on the page during detection. After the scan, we can view the Security scan results. Soon we can see the scan results. At the same time, we will put forward simple suggestions on how to prevent identified risks, the green "√" is displayed here, indicating that the system is currently in a safe state. If there are two other symbols, it indicates that there may be some security risks, to view more details, click "Show Details ".

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.