• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

question about zonealarm intrusion attacks.

Solodays

Senior member
my zonealarm firewall display listed 245 intrusions have been blocked. Does this mean that someone actually live attacking me, or trying to get into my pc or what?
 
Doubtful, it's just machines trying to find holes. 245 is nothing to worry about imho. Do you have a hardware router? I would run one along with the software for safety reasons.
 
what you mean machines trying to find holes? yeah, i believe my router does have firewall build in, probably outdated though.
 
on cable you are wide open and you get more attacks on zone alarm. On dsl, it shoudn't too much of a problem because you are on your own line.

This is some of the key features of zone alarm.

Firewall
? Intrusion Blocking stops known and unknown threats
? Stealth Mode hides you and your PC from hackers
? Expert Controls gives savvy users precision control over
detailed firewall rules

(Intrusion Detection System) Software that detects an attack on a network or computer system. A Network IDS (NIDS) is designed to support multiple hosts, whereas a Host IDS (HIDS) is set up to detect illegal actions within the host. Most IDS programs typically use signatures of known cracker attempts to signal an alert. Others look for deviations of the normal routine as indications of an attack. Intrustion detection is very tricky. Too much analysis can add excessive overhead and also trigger false alarms. Insufficient analysis can overlook a valid attack. See protocol anomaly , traffic anomaly , IPS and attack .
 
People are port scanning all the time. They're just looking for computers with open ports they can exploit. This is mostly automated software doing the port scanning. Mostly kiddies experimenting.

Don't worry about it as long as you're behind a router and/or firewall you're fine.

 
Back
Top