Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Setup
PC Setup Ideas
Ubuntu Hardening
Message
<blockquote data-quote="simmerskool" data-source="post: 1103236" data-attributes="member: 61091"><p>[USER=96560]@Victor M[/USER] website says: And you can test your firewall with the 'nmap' tool. Install nmap. Then issue the command > nmap 192.168.0.0/16</p><p>I tried this in VMware MX-Linux and nothing seemed to be happening. After about 15 min I used terminal signal to quit. Perhaps the internal ip is different because running in vm?</p><p>I minimally used nmap a decade++ ago, so more reading, but comments welcome. I do have an commercial grade router so perhaps that "killed" nmap, so far no indications of anything. I suppose the router might see a nmap scan as an attack? This is why linux is fun (for me) -- getting under the hood to some degree. Lots to (re)learn.</p><p></p><p>EDIT errr nevermind, I used chatGPT to get a clearer idea of what to do, then nmap becomes both informative and helpful. seeing a few open ports on both Host & Guest I need to "investigate." fun+</p></blockquote><p></p>
[QUOTE="simmerskool, post: 1103236, member: 61091"] [USER=96560]@Victor M[/USER] website says: And you can test your firewall with the 'nmap' tool. Install nmap. Then issue the command > nmap 192.168.0.0/16 I tried this in VMware MX-Linux and nothing seemed to be happening. After about 15 min I used terminal signal to quit. Perhaps the internal ip is different because running in vm? I minimally used nmap a decade++ ago, so more reading, but comments welcome. I do have an commercial grade router so perhaps that "killed" nmap, so far no indications of anything. I suppose the router might see a nmap scan as an attack? This is why linux is fun (for me) -- getting under the hood to some degree. Lots to (re)learn. EDIT errr nevermind, I used chatGPT to get a clearer idea of what to do, then nmap becomes both informative and helpful. seeing a few open ports on both Host & Guest I need to "investigate." fun+ [/QUOTE]
Insert quotes…
Verification
Post reply
Top