> There are others, but these comprise most intrusion blocks
> I'm trying to figure out how to handle best, and all fall in
> the category of "I don't think I know them."
> Any help on any of the 4 types?
In general, you should set your computer to block ALL incoming traffic that wasn't generated or requested by you. That is, why would an unknown computer want start talking to your computer if you didn't ask for something first?
I wouldn't worry about the name of the attacks, some of them might not even be attacks, for example, your ISP might just be interested in knowing if your IP is being used (by means of a ping). Or a google robot might be scanning your host for a webpage.
Cheers!
Alex