Having been violated...I am visiting with some thought...ipchains rules I am currently blocking the following ports on my external network card... 23 (telnet) 53 (dns) 67 (bootp) 68 (bootp) 137 (netbios) 138 (netbios) I also noticed that you have to be careful what you log when you are connecting to @home's shared bandwidth because if you ignore all the jerks doing endless port scanning, your logs will still multiply like flies in a Chicago neighborhood if you log activity at ports 67, 68 & 2301. obviously, if I want to give internet access to mail, ftp & www, I would allow ports 25, 110, 21 & 80 (possibly 443) but I'm wondering if I'm missing some obvious ports that are known to be exploited. Any suggestions? one other question...if I don't install ssh, is there any benefit to create a rule for ipchains to DENY/REJECT port 22 or is it meaningless if neither inetd nor any other daemon monitors it? thanks Craig ----:----|----:----|----:----|----:----|----:----|----:----| - Craig White - PO Box 8634 - Scottsdale, Arizona - 85252 - e-mail address ................ - CraigWhite@AzApple.com - world wide web address ........ - http://www.AzApple.com - e-mail my pager address ....... - 6023779752@airtouch.net - cellular phone ................ - (602) 377-9752 - voice/facsimile ............... - (480) 945-8445 ----:----|----:----|----:----|----:----|----:----|----:----|