On Mon, Dec 11, 2000 at 03:11:40PM -0600, Bill Layer wrote: >Starting nmap V. 2.53 by fyodor at insecure.org ( www.insecure.org/nmap/ ) >Interesting ports on localhost (127.0.0.1): >(The 1505 ports scanned but not shown below are in state: closed) >23/tcp open telnet Bad admin! BAD! <Shakes finger> >79/tcp open finger don't need that one. >113/tcp open auth >143/tcp open imap2 >513/tcp open login >514/tcp open shell Don't need these either. >Web, telnet, ftp, auth are all active on this machine, as I perceive no >threats on this LAN. Correct me if that is bad thinking. See above. > >Thanks again, Ben. No problem. You gonna be at the next tclug-beer-meeting? -- Ben Lutgens cell: 612.670.4789 http://www.sistina.com/ Sistina Software Inc. work: 612.379.3951 Code Monkey Support (A.K.A. System Administrator) Key fingerprint = A69A 118D 710B 8EB0 DC3B D912 2F19 311A 02DD 1908 Make the force be with you. And for god's sake men, be careful. ** Lt.Col. Eaton 3rd Battalion 14th Infantry - Panama Jungle 1991 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 230 bytes Desc: not available Url : http://shadowknight.real-time.com/pipermail/tclug-list/attachments/20001211/dbabe5e3/attachment.pgp