BAD
Commodore
- Registriert
- Aug. 2004
- Beiträge
- 4.354
Ich mache mir in letzer Zeit etwas mehr Gedanken um den Schutz meines System. Hier könnt ihr mal vergleichen wie gut euer PC abgeschottet ist vor eindringlingen.
Zum Vergleichen
Comodo Leaktest Downloaden & exe Datei ausführen.
http://www.testmypcsecurity.com/securitytests/firewall_test_suite.html
Schreibt hin was ihr auf eurem PC habt zum schutz.
Betriebssystem:
Firewall Typ:
Hardware Firewall:
AntiVirus:
Standart Browser:
Weitere Security Software:
Betriebssystem: WinXP SP3 - NAS System
Firewall Typ: Windows Firewall Deaktiviert
Hardware Firewall: DIR855
AntiVirus: Free AviraAntivirus
Standart Browser: Mozilla Firefox 4.0
Weitere Security Software: -
COMODO Leaktests v.1.1.0.3
Date 12:53:33 - 21.06.2011
OS Windows XP SP3 build 2600
1. RootkitInstallation: MissingDriverLoad Protected
2. RootkitInstallation: LoadAndCallImage Vulnerable
3. RootkitInstallation: DriverSupersede Vulnerable
4. RootkitInstallation: ChangeDrvPath Vulnerable
5. Invasion: Runner Protected
6. Invasion: RawDisk Vulnerable
7. Invasion: PhysicalMemory Vulnerable
8. Invasion: FileDrop Vulnerable
9. Invasion: DebugControl Vulnerable
10. Injection: SetWinEventHook Vulnerable
11. Injection: SetWindowsHookEx Vulnerable
12. Injection: SetThreadContext Vulnerable
13. Injection: Services Vulnerable
14. Injection: ProcessInject Protected
15. Injection: KnownDlls Vulnerable
16. Injection: DupHandles Protected
17. Injection: CreateRemoteThread Protected
18. Injection: APC dll injection Vulnerable
19. Injection: AdvancedProcessTermination Vulnerable
20. InfoSend: ICMP Test Protected
21. InfoSend: DNS Test Vulnerable
22. Impersonation: OLE automation Vulnerable
23. Impersonation: ExplorerAsParent Vulnerable
24. Impersonation: DDE Vulnerable
25. Impersonation: Coat Vulnerable
26. Impersonation: BITS Vulnerable
27. Hijacking: WinlogonNotify Vulnerable
28. Hijacking: Userinit Vulnerable
29. Hijacking: UIHost Vulnerable
30. Hijacking: SupersedeServiceDll Vulnerable
31. Hijacking: StartupPrograms Vulnerable
32. Hijacking: ChangeDebuggerPath Vulnerable
33. Hijacking: AppinitDlls Vulnerable
34. Hijacking: ActiveDesktop Vulnerable
Score 60/340
Firewall Typ: GData TotalCare 2011 / Windows Firewall Deaktiviert
Hardware Firewall: DIR855
AntiVirus: GData TotalCare 2011
Standart Browser: Mozilla Firefox 5.0
Weitere Security Software: -
COMODO Leaktests v.1.1.0.3
Date 11:04:03 - 21.06.2011
OS Windows Vista SP0 build 7600
1. RootkitInstallation: MissingDriverLoad Protected
2. RootkitInstallation: LoadAndCallImage Protected
3. RootkitInstallation: DriverSupersede Protected
4. RootkitInstallation: ChangeDrvPath Vulnerable
5. Invasion: Runner Protected
6. Invasion: RawDisk Vulnerable
7. Invasion: PhysicalMemory Protected
8. Invasion: FileDrop Vulnerable
9. Invasion: DebugControl Protected
10. Injection: SetWinEventHook Vulnerable
11. Injection: SetWindowsHookEx Vulnerable
12. Injection: SetThreadContext Protected
13. Injection: Services Vulnerable
14. Injection: ProcessInject Protected
15. Injection: KnownDlls Vulnerable
16. Injection: DupHandles Protected
17. Injection: CreateRemoteThread Protected
18. Injection: APC dll injection Protected
19. Injection: AdvancedProcessTermination Protected
20. InfoSend: ICMP Test Protected
21. InfoSend: DNS Test Vulnerable
22. Impersonation: OLE automation Protected
23. Impersonation: ExplorerAsParent Protected
24. Impersonation: DDE Vulnerable
25. Impersonation: Coat Vulnerable
26. Impersonation: BITS Protected
27. Hijacking: WinlogonNotify Protected
28. Hijacking: Userinit Vulnerable
29. Hijacking: UIHost Protected
30. Hijacking: SupersedeServiceDll Vulnerable
31. Hijacking: StartupPrograms Vulnerable
32. Hijacking: ChangeDebuggerPath Protected
33. Hijacking: AppinitDlls Vulnerable
34. Hijacking: ActiveDesktop Protected
Score 200/340
Zum Vergleichen
Comodo Leaktest Downloaden & exe Datei ausführen.
http://www.testmypcsecurity.com/securitytests/firewall_test_suite.html
Schreibt hin was ihr auf eurem PC habt zum schutz.
Betriebssystem:
Firewall Typ:
Hardware Firewall:
AntiVirus:
Standart Browser:
Weitere Security Software:
Ergänzung ()
Betriebssystem: WinXP SP3 - NAS System
Firewall Typ: Windows Firewall Deaktiviert
Hardware Firewall: DIR855
AntiVirus: Free AviraAntivirus
Standart Browser: Mozilla Firefox 4.0
Weitere Security Software: -
COMODO Leaktests v.1.1.0.3
Date 12:53:33 - 21.06.2011
OS Windows XP SP3 build 2600
1. RootkitInstallation: MissingDriverLoad Protected
2. RootkitInstallation: LoadAndCallImage Vulnerable
3. RootkitInstallation: DriverSupersede Vulnerable
4. RootkitInstallation: ChangeDrvPath Vulnerable
5. Invasion: Runner Protected
6. Invasion: RawDisk Vulnerable
7. Invasion: PhysicalMemory Vulnerable
8. Invasion: FileDrop Vulnerable
9. Invasion: DebugControl Vulnerable
10. Injection: SetWinEventHook Vulnerable
11. Injection: SetWindowsHookEx Vulnerable
12. Injection: SetThreadContext Vulnerable
13. Injection: Services Vulnerable
14. Injection: ProcessInject Protected
15. Injection: KnownDlls Vulnerable
16. Injection: DupHandles Protected
17. Injection: CreateRemoteThread Protected
18. Injection: APC dll injection Vulnerable
19. Injection: AdvancedProcessTermination Vulnerable
20. InfoSend: ICMP Test Protected
21. InfoSend: DNS Test Vulnerable
22. Impersonation: OLE automation Vulnerable
23. Impersonation: ExplorerAsParent Vulnerable
24. Impersonation: DDE Vulnerable
25. Impersonation: Coat Vulnerable
26. Impersonation: BITS Vulnerable
27. Hijacking: WinlogonNotify Vulnerable
28. Hijacking: Userinit Vulnerable
29. Hijacking: UIHost Vulnerable
30. Hijacking: SupersedeServiceDll Vulnerable
31. Hijacking: StartupPrograms Vulnerable
32. Hijacking: ChangeDebuggerPath Vulnerable
33. Hijacking: AppinitDlls Vulnerable
34. Hijacking: ActiveDesktop Vulnerable
Score 60/340
Firewall Typ: GData TotalCare 2011 / Windows Firewall Deaktiviert
Hardware Firewall: DIR855
AntiVirus: GData TotalCare 2011
Standart Browser: Mozilla Firefox 5.0
Weitere Security Software: -
COMODO Leaktests v.1.1.0.3
Date 11:04:03 - 21.06.2011
OS Windows Vista SP0 build 7600
1. RootkitInstallation: MissingDriverLoad Protected
2. RootkitInstallation: LoadAndCallImage Protected
3. RootkitInstallation: DriverSupersede Protected
4. RootkitInstallation: ChangeDrvPath Vulnerable
5. Invasion: Runner Protected
6. Invasion: RawDisk Vulnerable
7. Invasion: PhysicalMemory Protected
8. Invasion: FileDrop Vulnerable
9. Invasion: DebugControl Protected
10. Injection: SetWinEventHook Vulnerable
11. Injection: SetWindowsHookEx Vulnerable
12. Injection: SetThreadContext Protected
13. Injection: Services Vulnerable
14. Injection: ProcessInject Protected
15. Injection: KnownDlls Vulnerable
16. Injection: DupHandles Protected
17. Injection: CreateRemoteThread Protected
18. Injection: APC dll injection Protected
19. Injection: AdvancedProcessTermination Protected
20. InfoSend: ICMP Test Protected
21. InfoSend: DNS Test Vulnerable
22. Impersonation: OLE automation Protected
23. Impersonation: ExplorerAsParent Protected
24. Impersonation: DDE Vulnerable
25. Impersonation: Coat Vulnerable
26. Impersonation: BITS Protected
27. Hijacking: WinlogonNotify Protected
28. Hijacking: Userinit Vulnerable
29. Hijacking: UIHost Protected
30. Hijacking: SupersedeServiceDll Vulnerable
31. Hijacking: StartupPrograms Vulnerable
32. Hijacking: ChangeDebuggerPath Protected
33. Hijacking: AppinitDlls Vulnerable
34. Hijacking: ActiveDesktop Protected
Score 200/340
Zuletzt bearbeitet: