Tks a ton ricky once again
using a link
http:// http://www.richard.zonnet.nl/cgi-bin/nph-proxycheck, i have screened my box. pls go through it. And as per the output what is the term 'filtered' means
Open proxy check
Checking your computer (x.x.x.x) for common open proxies... Please wait until the page is loaded
To check: hosts=1, proto:ports=63, host:proto:ports=63
x.x.x.x:ho:80: HTTP request refused or failed (403)
x.x.x.x:hu:80: HTTP request refused or failed (403)
x.x.x.x:hc:80: HTTP request refused or failed (403)
NumOpen=0(0) NRead=3992 Time=10
If 'NumOpen' is larger than 0 you have an open proxy. Please close it down as soon as possible.
If 'NumOpen' is 0 no proxy could be detected, we only test a few of the many possible ports.
Now scanning your computer for common open ports... Please wait until the page is loaded
Starting nmap 3.75 ( http://www.insecure.org/nmap/ ) at 2005-09-01 08:12 CEST
Interesting ports on x.x.x.x (The 1639 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
103/tcp filtered gppitnp
111/tcp open rpcbind
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
1025/tcp filtered NFS-or-IIS
1080/tcp filtered socks
1241/tcp filtered nessus
1720/tcp filtered H.323/Q.931
3128/tcp filtered squid-http
4444/tcp filtered krb524
4899/tcp filtered radmin
5000/tcp filtered UPnP
6000/tcp open X11
6112/tcp filtered dtspc
6588/tcp filtered analogx
8080/tcp filtered http-proxy
10000/tcp open snet-sensor-mgmt
12345/tcp filtered NetBus
Nmap run completed -- 1 IP address (1 host up) scanned in 16.750 seconds
If you see open ports like 135, 137 and 445 your computer is potentially vulnerable.