Just found this one, maybe it will be useful: http://www.lavasoft.com/support/faq_firewall.php?#16 From a security standpoint, TCP and UDP ports on your system are divided into several groups according to their probability of being used by an attacker. Attempts to access ports that are assigned to vulnerable services like DCOM or RPC should be s... See more Just found this one, maybe it will be useful: http://www.lavasoft.com/support/faq_firewall.php?#16 From a security standpoint, TCP and UDP ports on your system are divided into several groups according to their probability of being used by an attacker. Attempts to access ports that are assigned to vulnerable services like DCOM or RPC should be seen as serious indications that you are being maliciously probed. Vulnerable ports are divided in two groups: System and Trojan. System ports are vulnerable because they are often open for everyday system services. Trojan ports are those known to be exploited by Trojan horses. We recommend paying special attention to the following ports: * System: 0, 21-23, 25, 79, 80, 110, 113, 119, 135, 137, 139, 143, 389, 443, 445, 1002, 1024-1030, 1720, 1900, 5000, 8080 * Trojan: 21, 23, 25, 80, 113, 137, 139, 555, 666, 1001, 1025, 1026, 1028, 1243, 2000, 5000, 6667, 6670, 6711, 6776, 6969, 7000, 8080, 12345, 12346, 21554, 22222, 27374, 29559, 31337, 31338 ▲ Collapse | |