I installed nftables on my Debian desktop a few weeks ago
with a basic ruleset configuration, and tested it on grc.com
online port scan of the first 1056 ports for true stealth - which
passed with complete success
I repeated the test today
NO PORTS were found to be OPEN.
1054 Ports were found to be Stealth
Ports 1026, 1031 were found to be CLOSED - not stealth
Port 1026 page of grc.com's Port Authority Database
includes the following information :
Name: cap
Purpose: Calender Access Protocol
Description:
Microsoft operating systems tend to allocate one or more unsuspected, publicly exposed services (probably DCOM, but who knows) among the first handful of ports immediately above the end of the service port range (1024+).
Last week, i tried to download Windows 10 from Microsoft official website
for my daughter's laptop
(I had nothing to do with Microsoft windows for more than a decade)
and i went along with the download procedure.
What am i to conclude ?
Did Microsoft place some sort of malware on my desktop ?
How should i deal with this ?