Digisane
Member

Registered: Jun 2002
Location: By the toilet.
Posts: 174 |
Thank you
First of all I'd like to thank Pathdoc, BobbyMike, KRamsauer and Yorick for helping me out.
quote: Originally posted by Pathdoc
I run Norton Personal Firewall as well. The report indicates that someone was probing one of your ports (whichever one that particular Trojan uses) to see if the Trojan was present. It does not mean that the Trojan is present, someone is simply looking to see if it is. If the Trojan were present and you were not running a Firewall, then they could do dastardly deeds to your computer. Basically, you are fine and need to do nothing else. If the probes continually come from the same IP address, Norton's does allow you to block that computer permanently. Looking in the instructions.
And if you look at the log, it's blocked by default, that means that this is already a built-in security to prevent trojan horses, I have no idea what might be probing the port. The log also indicates a certain pattern... note that WinCrash was used multiple times as if repeatedly trying to crash me. It did got to me once, or maybe it was a coincidence, I came back to see a blue screen.
I was infected by T-Horses once back when i was still using dial-up but I'm not sure if the T-Horse is smart enough to know that I've completely changed ISPs considering that they (apperently) don't exist on my computer. So how can somebody just come up with a random IP address and get it correct multiple times??
Also, nobody I know of can explain the behaviour of all the other program files that i mention of. I'm guessing It's sort of like some super trojan horse is using these programs to disguise itself to access the internet. I can't block out some of the programs permenantly because that would stop them from working, (i.e, Netscape).
quote: Originally posted by KRamsauer
What I've found is that often you will get port scans by someone looking for a trojan horse installed on your computer. For instance if you write a TH called "Fred" that listens to port 7, you will broadcast from your computer to port 7 at random IPs to see if Fred responds. Then you can do your dirty work. However, a firewall will block this and log it as a problem even though there is nothing malicious on your computer, and that even if the signal had gotten through, nothing would have happened because Fred isn't there. At least that's my interpretation.
Let's hope that is true.
I'm checking out all your suggested sites now. Thanks again.
__________________
I'm just a dreamer..
|