Hi, I think there is some confusion. First, ports are not stealthed outbound - never. Inbound ports are either open (can be seen, will respond to pings, open to inbound requests), closed (can be seen, will respond to pings, not open to inbound requests), or stealthed (cannot be seen, will not respond to pings, not open to inbound requests). A good hardware
firewall can set any port (inbound or outbound) to open or closed, and inbound ones only to stealth. A software firewall with HIPS
can add program level controls that change the settings by program either receiving or sending a packet. A software firewall cannot overrule the settings at the hardware firewall.
Now, many programs communicate with other parts of their program or the system using an "internal" internet within a single system. You will note some lines have either an IP of 127.0.0.1 or "localhost". Those are feedback links to your own system that never exit as packets to either your LAN or the Internet, but are used to communicate internally.
Now, the ports you reference in your list:
1051 - may be malware (W32.Kassbot)
1049 - appears legit
1043 - BOINC (various distributed projects such as SETI-at-Home, etc.)
1036 - Nebula Secure Segment Transfer Protocol, legit
1034 - likely malware (Zincite, W32.Mydoom, W32.Zindos)
1033 - local netinfo port, usually legit
1031 - This is probably a dynamically assigned port used by a program supporting MS RPC (remote procedure calls - a critical system component) over TCP
1040 - possible Trojan backdoor
Now, instead of feeding us info a tiny bit at a time, I strongly recommend that you carefully read and follow all the pinned topics at the top of our http://spywarehammer.com/simplemachinesforum/index.php?board=10.0
forum. Then start a new topic in that forum by posting a HJT log. Do not post the HJT log in this topic. Once you do that, one of our experts will help you diagnose and remove any malware that may be on your system.