C
Carl
I ran the Symantec online checks for Security Scan and Virus
Detection.
Their Virus Detection check reported 25,934 files scanned & 0 files
infected on the disk drives and no viruses detected in memory.
Their Security Scan found only one problem, Port 4567 name: filenail
Open.
Googling filenail produced this:
File Nail backdoor (FileNail_TCP_Request)
Unauthorized Access Attempt
Vulnerability description File Nail, also known as Nail and
Backdoor.Nail, is a backdoor Trojan written in Visual Basic that
affects Microsoft Windows operating systems. The backdoor uses a
client/server relationship, where the server component is installed in
the victim's system and the remote attacker has control of the client.
The server attempts to open a port, typically TCP port 4567, to allow
the client system to connect. File Nail could allow a remote attacker
to gain unauthorized access and gain complete control of the system.
How to remove this vulnerability: Use an up-to-date antivirus program
to determine if the target computer is host to a backdoor program. If
the program detects a backdoor, follow its instructions to disinfect
and repair the computer.
Again: Symantec Virus Detection found no infected files and I ran a
system check with the free version of Avira and it too reported no
problems.
So, in the immortal words of Laurence Olivier in "Marathon Man": "Is
it safe?"
Many thanks,
Carl
Detection.
Their Virus Detection check reported 25,934 files scanned & 0 files
infected on the disk drives and no viruses detected in memory.
Their Security Scan found only one problem, Port 4567 name: filenail
Open.
Googling filenail produced this:
File Nail backdoor (FileNail_TCP_Request)
Unauthorized Access Attempt
Vulnerability description File Nail, also known as Nail and
Backdoor.Nail, is a backdoor Trojan written in Visual Basic that
affects Microsoft Windows operating systems. The backdoor uses a
client/server relationship, where the server component is installed in
the victim's system and the remote attacker has control of the client.
The server attempts to open a port, typically TCP port 4567, to allow
the client system to connect. File Nail could allow a remote attacker
to gain unauthorized access and gain complete control of the system.
How to remove this vulnerability: Use an up-to-date antivirus program
to determine if the target computer is host to a backdoor program. If
the program detects a backdoor, follow its instructions to disinfect
and repair the computer.
Again: Symantec Virus Detection found no infected files and I ran a
system check with the free version of Avira and it too reported no
problems.
So, in the immortal words of Laurence Olivier in "Marathon Man": "Is
it safe?"
Many thanks,
Carl