I use a program called AWSPS ( All Windows Security Port Scanner ) it traces, routing etc, etc, there are plenty of free port scanners out there.
from AWSPS info
port 80 is for World Wide Web
some common Trojans that use this port are
AckCmd, Back End, CGI Backdoor, Executor, Hooker, RingZero and many more.
port 139 is for Net Bios,
some common Trojans that use that port are
Chode, God Message worm, Msinit, Netlog, Network, Qaz, Sandmind SMB Relay,
ports 15266, 27260 are not assigned
they can be used for anything.
port 135 is for Microsoft DCE endpoint resolution/location Service
port 445 is used for Microsoft-DS, It is used by windows 2000 for SMB over TCP and UDP concurrently or alternatively with the traditional
implementation over ports 137, 138 and 139.
now this information is from the software AWSPS so it could vary between programs. but as long as you have a good firewall and virus program and
don't open any files that you don't know or where not expecting that have exe extensions on them. You are still okay if you do get a file and you
are not sure, right click it and run a virus check in most cases a virus program will capture the infected file and stick it in some type of
Zenem I would suggest a good firewall that will allow you to run in full stealth mode I use ZoneAlarm Pro, it can be used for a week or so for free or
you can download a free version
Intrusion Blocking systematically identifies hackers and
blocks access attempts.
Stealth Mode automatically makes your computer invisible to
anyone on the Internet.
Automatic Program Configuration provides safety and
simplicity by automatically configuring programs. Automatically
decides whether to allow or deny Internet access to individual
Expert Controls give savvy users precise control over