Port Scanster v1.8 is an application that scans the local or a remote system to check for ports that may be open to attack by "Trojans" or crackers trying to access the system.
Chick the image to view full screenshot >>>
* What Will This Scanner Tell Me?
A scanner might reveal certain inherent weaknesses within the target host. These might be key factors in implementing an actual compromise of the target's security. In order to reap this benefit, however, you must know how to recognize the hole.
* Why Are Scanners Important to Internet Security?
Scanners are important to Internet security because they reveal weaknesses in the network. Whether this information is used by hackers or crackers is immaterial. If used by system administrators, scanners help strengthen security in the immediate sense. If employed by crackers, scanners also help strengthen security. This is because once a hole has been exploited, that exploitation will ultimately be discovered. Some system administrators argue that scanners work against Internet security when in the hands of crackers. This is not true. If a system administrator fails to adequately secure his or her network (by running a scanner against it), his or her negligence will come to light in the form of a network security breach.
* Are Scanners Legal?
Yes/No. Scanners are most often designed, written, and distributed by security personnel and developers. These tools are usually given away, via public domain, so that system administrators can check their own systems for weaknesses. However, although scanners are not illegal to possess or use, employing one if you are not a system administrator would meet with brutal opposition from the target host's administrator. Moreover, certain scanners are so intrusive in their probing of remote services that the unauthorized use of them may violate federal or state statutes regarding unauthorized entry of computer networks. This is a matter of some dispute and one not yet settled in law. Therefore, be forewarned.
* WARNING: Do not take scanning activity lightly. If you intend to scan wide ranges of domains, check the laws in your state. Certain states have extremely particular legislation. The wording of such statutes is (more often than not) liberally construed in favor of the prosecution. For example, the state of Washington has provisions for computer trespass. (Wash. Rev. Code Sec. 9A.52 110-120.) If you deploy a scanner that attempts to steal the passwd file (a password file on the UNIX platform located in the directory /ETC), you might actually have committed an offense.
* = copied from http://desperado.port5.com/text/scanners.txt
First, please take a moment to read this important notice before considering installing!
Please be notified that "Port Scanster v1.8" is furnished as a tool to be used by authorized system personnel or system owners. In NO way is the release intended to be used in a un-constructive way or manner!
We are not "crackers" (commonly and mistakenly referred to as "hackers"). By installing this setup program you are agreeing that this software is to be used in a constructive and legal manner and that you agree to the following terms.
Terms of use...
I affirm that I am the legal owner or authorized to access information of all systems this software will be installed on or used to explore. I have the legal right to access all data, information, passwords, and files therein. I further attest that this software, nor the returned data , will not be used for any illegal purpose. I further attest that by Customized Computer Software providing this software that they are not participating in any illegal activity.
If you do not agree with these terms; please DO NOT install this software!
|