Craig White wrote: > > > -----Original Message----- > > From: plug-discuss-admin@lists.plug.phoenix.az.us > > [mailto:plug-discuss-admin@lists.plug.phoenix.az.us]On Behalf Of Kevin > > Brown > > Sent: Sunday, April 29, 2001 9:06 PM > > To: plug-discuss@lists.plug.phoenix.az.us > > Subject: Re: culture of *NIX > > > > If this won't hurt your conscience, then how about letting us > > know who this > > person is if they do business on the web so that we won't put > > ourselves at risk > > by buying from someone who would put our CC# on a box accessible > > from the web. > > ________________________________________________ > > Actually, I do worry about many things here...I am reasonably confident that > I have convinced him of the folly in putting the db on this machine and in > fact, is not currently running dbms on this machine. I am also fairly > certain that no one in this group does business with them. > > Starting nmap V. 2.54BETA7 ( www.insecure.org/nmap/ ) > Interesting ports on (x.x.x.x): > (The 1524 ports scanned but not shown below are in state: closed) > Port State Service > 81/tcp open hosts2-ns > 135/tcp open loc-srv > 389/tcp open ldap > 443/tcp open https > 1002/tcp open unknown > 1025/tcp open listen > 1026/tcp open nterm > 3005/tcp open deslogin > 3333/tcp open dec-notes > 3389/tcp open msrdp > > TCP Sequence Prediction: Class=random positive increments > Difficulty=6376 (Worthy challenge) > Remote OS guesses: Windows 2000 RC1 through final release, Windows Millenium > Edition v4.90.3000 > > Nmap run completed -- 1 IP address (1 host up) scanned in 15 seconds What options did you use to run this nmap report? Thanks, Eric