The more secure thing would be to put your cameras (or anything else you have ports forwarded to) on their own subnet and segregate them. I generally use AngryIP for most of my testing. I set it up with several dozen ports. Im not a fan of GRC either but it is a tool that can be used if understood. my 2 pennies.

Port Authority Database Help Accessing the GRC Port Info Database: Online data for any Internet port within the range from 0 through 65535 may be accessed through the port Jump links at the bottom of any port database page, or directly with a URL of this form: The best way to determine if your computer's (or router's) firewall is working and optimized is to effectively try to penetrate it. Browser-based utility ShieldsUP! tests your firewall for Fig.01: Linux/Unix: Use Netcat to Establish and Test TCP and UDP Connections on a Server Where,-z: Port scanning mode i.e. zero I/O mode.-v: Be verbose [use twice -vv to be more verbose].-n: Use numeric-only IP addresses i.e. do not use DNS to resolve ip addresses.-w 1: Set time out value to 1.; More examples: $ netcat -z -vv http [] 80 (http The port scanner tool will provide you with information regarding valid methods of connecting to a network. Scan your network for open ports and determine if those open ports need to be closed to provide more network security and less vulnerabilities. TCP Port Scanner. With this online TCP port scanner you can scan an IP address for open ports. Use this TCP port scan tool to check what services (apache, mail, ssh, ftp, mysql, telnet, dns) are running on your server, test if your firewall is working correctly, view open TCP ports. GRC Port Authority Report created on UTC: 2017-01-09 at 12:30:20 Results from scan of ports: 0-1055 0 Ports Open 1 Ports Closed 1055 Ports Stealth ----- 1056 Ports Tested NO PORTS were found to be OPEN. The port found to be CLOSED was: 135 Other than what is listed above, all ports are STEALTH.

Nov 27, 2015 · You can scan individual port too: nc -zv v.txvip1 443 nc -zv v.txvip1 80 nc -zv v.txvip1 22 nc -zv v.txvip1 21 nc -zv v.txvip1 smtp nc -zvn v.txvip1 ftp ## really fast scanner with 1 timeout value ## netcat -v -z -n -w 1 v.txvip1 1 - 1023

I started out with a SCH-LC11 Hotspot and would go to, then ShieldsUp and do a common ports and all service ports scan. They would come back with all ports stealth and a pass grade. I had problems with the SCH-LC11 dropping the network connection because I am in a area between 3G and 4G and it was trying to go back and forth. I have used GRC Sheilds Up in the past and haven't had any problems. It is important, however, to have a good anti virus application, such as Vijay has suggested, Microsoft Security Essentials. Personally I certainly wouldn't be using Mcafee or Norton anti virus, both being resource hoggers. However, that is my opinion some may disagree. Oct 09, 2017 · Port 443 is a service that is needed internally within your network and therefore safe to use. However, your router appears to have this port 443 open to the public as well. Therefore the ESET alert is telling you to close that port so that the world cannot access that port to get inside your internal network. Dec 09, 2004 · Welcome to, a friendly and active Linux Community. You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features.

GRC Port Scans by slybo May 3, 2011 7:06PM PDT. No problem just looking for opinions. I have always had cable with a router and would do the ShieldsUp scans, common ports and all service

The best way to determine if your computer's (or router's) firewall is working and optimized is to effectively try to penetrate it. Browser-based utility ShieldsUP! tests your firewall for Hi, I have run the Shields Up scan on a computer connected to two different networks (different ISPs, different locations). Both give the same results - port 443 is open, 70 ports are closed and the remainder are stealthed out of 1056 tested. This is pointed out by GRC as a vulnerability, in particular port 443.