I’m running BlackIce, too. Most of what I see on my own subnet is NetBios or PCAnywhere port access. These are typically not malicious, it just means somebody is attempting to use network software designed for LAN’s that automatically pings everybody on the subnet. I’ve given up on getting my ISP to tell people to stop doing that. I’ve suggested that they put a blurb concerning PCAnywhere and such programs in their FAQ, but they haven’t.
Before I got BlackIce I bound WINS client solely to the loopback adapter anyway, so they were going to get precious little joy out of that route.
I see a fair number of attempts on the RPC service. Fat lot of good that would do them on a windows box.
BlackIce’s advice pages and knowledge base are pretty good.
It depends. If they’re sophisticated enough to have found an unguarded proxy to go through, it gets difficult. If the ISP they use is careless about logging, or uncooperative, it can be difficult also. If I see something that looks particularly egregious, I try to trace it. I reported some bozo who was trying every every commonly used TCP port on my system to the originating ISP, and and they sent back a response to make sure of times, IP address and so on, so that one may have accomplished something.
From what I’ve seen, a lot of the ones that really look like deliberate hack attempts come from some Asian pool that I assume is getting hijacked.
BTW, some of you guys are running cable modem. The BlackIce docs say that cable modem gets hit a lot more than DSL because the small range of IP addresses used by those services makes it attractive to scanners. If I screen out the subnet junk I mentioned at the start, I’m seeing an average of maybe a couple really suspicous looking things a week on DSL. Does cable modem really seem to get a higher volume?
True, but they have to scan you when you are connected, which may not be likely, and some of the sophisticated hackers may not bother scanning ranges they know belong to large dialup pools.
One way to REALLY reduce your risks - run on a Mac. It’s not that it’s impossible to hack into an Apple OS, it’s just that most of the commonly known exploits are for Windows or Linux based software. Most hackers just aren’t interested in breaking into Apple machines.