|Any computer connected to the Internet is potentially vulnerable to intrusion attempts. You can check your computer's vulnerability using online tools, such as ShieldsUP!!|4350|3810|1425|3270||5820|6380|0|0|
|ShieldsUP!! first displays the IP address that's associated with your Internet connection. Take a minute to read the explanation that describes the significance of this address.|7380|420|1335|3885||5820|6380|0|0|
|ShieldsUp!! offers several services to help you determine if your computer is vulnerable to intrusions. The first thing to check is the status of file sharing ports and NetBIOS protocols.|1755|440|1650|3105||5820|6380|4|0|
|For the best security, your Internet port 139 should not be visible to intruders and NetBIOS should not be active.|8595|1035|1095|3105||5820|6380|0|0|
|If your computer is properly protected, hackers cannot access any ports on your computer and you will get a "Passed" rating from the ShieldsUP!! test.|8220|120|1425|3090||5820|6380|0|0|
|If a port does not respond to the test, it will not respond to a hacker's port probe, making it impossible for an intrusion to succeed.|7810|6030|1410|2955||5820|6380|1|0|
|You should check your computer's port vulnerability periodically, especially after installing new software, changing security settings, or switching your security software. When your computer's ports are invisible, you've blocked a common point of entry for hackers and identity thieves.|7635|5760|1950|3870||5820|6380|0|0|