>>TCP SYN Flooding
This is where a TCP connection is started but never fully established. You remember the 3-way handshake for a TCP connection? Well, SYN attacks are where the attacking PC initiates part 1, the target PC responds as part 2, but the attacking PC nevers completes part 3. The result is the target PC allocates and wastes resources by waiting for connections to finish establishing, when they never actually will. Flood a PC with SYNs, and it'll eventually die.

Now, port 135 is MS's RPC port, so from your message here:
192.168.2.14:4574 ->> 192.169.154.172:135
it looks like 2.14 is trying to attack the second computer.

I'd recommend a good virus scanner, and spyware check. Then hope over to windowsupdate.microsoft.com and make sure you've got all the latest patches to fix those nasty buffer overflows.