Try "Black Ice." It is a great little program that you can download from
www.download.com with a 30-day, fully-functional trial.
I had played Nerf Arena Blast for weeks on end and noticed that there would
be a probe/packet storm from a certain IP roughly around the time that
things in my game would come screeching to a halt.
I have this question: typically the DNS or IP address reports someone who
is difficult to pinpoint, then what?
hope this helps,
gary r. tennesen
[log in to unmask]
----- Original Message -----
From: "John Sproule" <[log in to unmask]>
To: <[log in to unmask]>
Sent: Thursday, January 04, 2001 7:06 PM
Subject: [PCBUILD] Seeking recommendations for software to monitor internet
attacks
> Hello all,
>
> I was wondering if someone could recommend software for monitoring
malicious
> attempts to connect to my computer. I'm actually more interested in
> identifying and logging attacks that I think would be considered denial of
> service attacks, rather than just port scans. I play some online computer
> games, and it is not that ususual to find myself crashed out of a game
with
> my computer needing a reboot to recover. The circumstances of when these
> incidents occur makes me suspect that someone I was connected to enjoys
> causing people grief more so than playing the game. In any case, I am
> interested in somekind of monitoring software that would give me some
> evidence of something like this happening, rather than my just suspecting
> that this was the case.
>
> I have an ADSL connection that passes through a Linksys router. The
router
> has some logging capacity, but it seems pretty limited, simply listing the
> IP address and the port number (TCP presumably) for incoming and outgoing
> connections made. I was thinking that I could run the monitoring software
> on a second computer hooked up to the router. I could even place this
> computer outside of the router's "firewall", though I don't know if that
is
> necessary for what I'm interested in. Perhaps it will be necessary to
have
> a computer placed out from behind the router ("DMZ setting"), in order to
> log the attack, if it is basically taking down the router, first, and only
> indirectly taking my computer with it. I'm running Win 98 SE, which
limits
> the tools that are available.
>
> I know this is a complex subject matter and I am probably entering waters
> that are over my head, but I would appreciate any and all information on
> this topic.
>
> TIA,
>
> John
>
> The NOSPIN Group is now offering Free PC Tech
> support at our newest website:
> http://freepctech.com
The NOSPIN Group is now offering Free PC Tech
support at our newest website:
http://freepctech.com
|