culture of *NIX

Eric Richardson plug-discuss@lists.PLUG.phoenix.az.us
Mon, 30 Apr 2001 08:17:44 -0700


Craig White wrote:
> 
> > -----Original Message-----
> > From: plug-discuss-admin@lists.plug.phoenix.az.us
> > [mailto:plug-discuss-admin@lists.plug.phoenix.az.us]On Behalf Of Kevin
> > Brown
> > Sent: Sunday, April 29, 2001 9:06 PM
> > To: plug-discuss@lists.plug.phoenix.az.us
> > Subject: Re: culture of *NIX
> >
> > If this won't hurt your conscience, then how about letting us
> > know who this
> > person is if they do business on the web so that we won't put
> > ourselves at risk
> > by buying from someone who would put our CC# on a box accessible
> > from the web.
> > ________________________________________________
> 
> Actually, I do worry about many things here...I am reasonably confident that
> I have convinced him of the folly in putting the db on this machine and in
> fact, is not currently running dbms on this machine. I am also fairly
> certain that no one in this group does business with them.
> 
> Starting nmap V. 2.54BETA7 ( www.insecure.org/nmap/ )
> Interesting ports on (x.x.x.x):
> (The 1524 ports scanned but not shown below are in state: closed)
> Port       State       Service
> 81/tcp     open        hosts2-ns
> 135/tcp    open        loc-srv
> 389/tcp    open        ldap
> 443/tcp    open        https
> 1002/tcp   open        unknown
> 1025/tcp   open        listen
> 1026/tcp   open        nterm
> 3005/tcp   open        deslogin
> 3333/tcp   open        dec-notes
> 3389/tcp   open        msrdp
> 
> TCP Sequence Prediction: Class=random positive increments
>                          Difficulty=6376 (Worthy challenge)
> Remote OS guesses: Windows 2000 RC1 through final release, Windows Millenium
> Edition v4.90.3000
> 
> Nmap run completed -- 1 IP address (1 host up) scanned in 15 seconds

What options did you use to run this nmap report?

Thanks,
Eric