SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Computer Learning

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Tom Swift who wrote (8480)2/27/2000 1:42:00 AM
From: mr.mark  Read Replies (2) of 110583
 
will a blackice defender user please try a test at this networkice knowledge base site?

advice.networkice.com

this is the test i'm having trouble with:

advice.networkice.com
"This site sends hostile traffic at your computer, but the responses are ignored. Its purpose is to verify that our product is running, and suggest what the problem is if it doesn't trigger an alert."

when i click on the above link, here is what i encounter:

"scan me

Clicking on the above link will send a fake Back Orifice packet back to your system. Do not worry, this isn't a real attack."


then, this is the error message i get when i click on the scan me link :

"HTTP Error 403

403.2 Forbidden: Read Access Forbidden

This error can be caused if there is no default page available and directory browsing has not been enabled for the directory, or if you are trying to display an HTML page that resides in a directory marked for Execute or Script permissions only.

Please contact the Web server's administrator if the problem persists."


i've emailed support but i'd like to know if anyone else encounters the same prob. i've tried using both ie5.0 and nc4.7

btw, i have previously run tests from three of the other links... dslreports, grc and secureme. they're pretty cool. and i tried the vulchke link too:

it-sec.de
"Checks to see if Windows sharing is exposing hard-drives as well as for a couple of common Trojan Horses."

thanks

:)

mark
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext