1.mam
2. od ręki
3. limitu nie ale blokada p2p od 10 do 24
4. 1mb/s
5. nie
Co myslec o tym? czy to jest w porządku?
Service Ports Status Additional Information
FTP DATA 20 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
FTP 21 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
SSH 22 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
TELNET 23 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
SMTP 25 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
DNS 53 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
DCC 59 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
FINGER 79 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
WEB 80 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
POP3 110 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
IDENT 113 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
Location Service 135 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
NetBIOS 139 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
HTTPS 443 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
Server Message Block 445 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
SOCKS PROXY 1080 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
UPnP 5000 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
WEB PROXY 8080 BLOCKED This port has not responded to any of our probes. It appears to be completely stealthed.
ICMP 8 OPEN An ICMP ping request is usually used to test Internet access. However, an attacker can use it to determine if your computer is available and what OS you are running. This gives him valuable information when he is determining what type of attack to use against you
czy tak ma byc jesli chodzi o p2p?

Bo ja nie wiem