It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Your Internet connection has no Reverse DNS
Many Internet connection IP addresses are associated with a DNS machine name. (But yours is not.) The presence of "Reverse DNS", which allows the machine name to be retrieved from the IP address, can represent a privacy and possible security concern for Internet consumers since it may uniquely and persistently identify your Internet account — and therefore you — and may disclose other information, such as your geographic location.
When present, reverse DNS is supported by Internet service providers. But no such lookups are possible with your current Internet connection address (xxx.xxx.xxx.xxx). That's generally a good thing.
Attempting connection to your computer. . .
Shields UP! is now attempting to contact the Hidden Internet Server within your PC. It is likely that no one has told you that your own personal computer may now be functioning as an Internet Server with neither your knowledge nor your permission. And that it may be serving up all or many of your personal files for reading, writing, modification and even deletion by anyone, anywhere, on the Internet!
Preliminary Internet connection refused!
This is extremely favorable for your system's overall Windows File and Printer Sharing security. Most Windows systems, with the Network Neighborhood installed, hold the NetBIOS port 139 wide open to solicit connections from all passing traffic. Either this system has closed this usually-open port, or some equipment or software such as a "firewall" is preventing external connection and has firmly closed the dangerous port 139 to all passersby. (Congratulations!)
Unable to connect with NetBIOS to your computer.
All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet.
GRC Port Authority Report created on UTC: 2011-02-17 at 05:15:02
Results from scan of ports: 0-1055
0 Ports Open
103 Ports Closed
953 Ports Stealth
---------------------
1056 Ports Tested
NO PORTS were found to be OPEN.
Your Internet connection has no Reverse DNS
Many Internet connection IP addresses are associated with a DNS machine name. (But yours is not.) The presence of "Reverse DNS", which allows the machine name to be retrieved from the IP address, can represent a privacy and possible security concern for Internet consumers since it may uniquely and persistently identify your Internet account — and therefore you — and may disclose other information, such as your geographic location.
When present, reverse DNS is supported by Internet service providers. But no such lookups are possible with your current Internet connection address (##edited out by me##). That's generally a good thing.
Your Connection to Our Web Server is Probably 'Proxied' What's a 'Proxy' ? A 'Proxy' is an intermediate computer that 'intercepts' a request made for an Internet resource, then reissues that request on behalf of the intercepted computer. For example — as happened here just now — your computer's web browser requested a resource (this page) from the grc.com web site. But your browser's request was intercepted by a 'transparent' intermediate proxying computer — probably belonging to your Internet service provider. That proxying computer, in turn, forwarded the request to grc.com's web server. Our security testing technology detected that this was happening and responded to the proxy with this special 'intercept' page so that the proxy would, in turn, return it to your web browser. Because none of this is usually very important for normal web surfing, such proxies are termed 'transparent'. But the problem is that they are not transparent enough to allow reliable security testing. Since we were connected to the proxy, rather than to your computer, we are unable to accurately analyze the security of your computer's connection to the Internet. (We could tell you all about the proxy's security, but that's a subject for another page.) Internet service providers often use proxies to improve the subjective performance of their network for their customers. By locally storing copies of often-requested web resources (like all the various bits and pieces of Amazon's web site) web pages assemble much more quickly. Most people are never aware of their existence. The ShieldsUP! system incorporates technology designed to circumvent many common web browser proxies so that most of our visitors never encounter this special interception page. This built-in circumvention technology is one of several reasons why ShieldsUP!'s tests are often more accurate than other web-based online security tests. However, in this case, it appears that our automatic proxy circumvention system has failed to determine your machine's true IP address, so the results of further tests would not be trustworthy. The worrisome header contained in your request is: Via: 113.234.22.240 The presence of this header is indicative of an intermediate proxy, as discussed above. We are unable to bypass this proxy, since even your browser's secure SSL connections are being intercepted. If you are able to disable your browser's use of this proxy we'll be able to check your system, but until then we are unable to proceed.
Originally posted by Stupe
reply to post by watchitburn
Told me the same thing and I run a plain old free windows firewall and the free microsoft security essentials...