Craig White wrote:
>
> > -----Original Message-----
> > From: plug-discuss-admin@lists.plug.phoenix.az.us
> > [mailto:plug-discuss-admin@lists.plug.phoenix.az.us]On Behalf Of Kevin
> > Brown
> > Sent: Sunday, April 29, 2001 9:06 PM
> > To: plug-discuss@lists.plug.phoenix.az.us
> > Subject: Re: culture of *NIX
> >
> > If this won't hurt your conscience, then how about letting us
> > know who this
> > person is if they do business on the web so that we won't put
> > ourselves at risk
> > by buying from someone who would put our CC# on a box accessible
> > from the web.
> > ________________________________________________
>
> Actually, I do worry about many things here...I am reasonably confident that
> I have convinced him of the folly in putting the db on this machine and in
> fact, is not currently running dbms on this machine. I am also fairly
> certain that no one in this group does business with them.
>
> Starting nmap V. 2.54BETA7 ( www.insecure.org/nmap/ )
> Interesting ports on (x.x.x.x):
> (The 1524 ports scanned but not shown below are in state: closed)
> Port State Service
> 81/tcp open hosts2-ns
> 135/tcp open loc-srv
> 389/tcp open ldap
> 443/tcp open https
> 1002/tcp open unknown
> 1025/tcp open listen
> 1026/tcp open nterm
> 3005/tcp open deslogin
> 3333/tcp open dec-notes
> 3389/tcp open msrdp
>
> TCP Sequence Prediction: Class=random positive increments
> Difficulty=6376 (Worthy challenge)
> Remote OS guesses: Windows 2000 RC1 through final release, Windows Millenium
> Edition v4.90.3000
>
> Nmap run completed -- 1 IP address (1 host up) scanned in 15 seconds
What options did you use to run this nmap report?
Thanks,
Eric