Tews
March 4th, 2009, 05:23 PM
I recently ran across Gibson Research Corps' website (grc.com) to check how secure my ports were. It showed that all were in "stealth" mode ( very good! ) but said that my computer was responding to their PING requests ..
Ping Reply: RECEIVED (FAILED) — Your system REPLIED to our Ping (ICMP Echo) requests, making it visible on the Internet. Most personal firewalls can be configured to block, drop, and ignore such ping requests in order to better hide systems from hackers. This is highly recommended since "Ping" is among the oldest and most common methods used to locate systems prior to further exploitation.
I always have ufw enabled just to be on the safe side, however I cant figure out how to ignore/block ping requests... Does anyone know how this is done, or am I unnecessarily paranoid??
Thanks!!
Ping Reply: RECEIVED (FAILED) — Your system REPLIED to our Ping (ICMP Echo) requests, making it visible on the Internet. Most personal firewalls can be configured to block, drop, and ignore such ping requests in order to better hide systems from hackers. This is highly recommended since "Ping" is among the oldest and most common methods used to locate systems prior to further exploitation.
I always have ufw enabled just to be on the safe side, however I cant figure out how to ignore/block ping requests... Does anyone know how this is done, or am I unnecessarily paranoid??
Thanks!!