wholesale vintage brass jewelry findings Commonly used port number

wholesale vintage brass jewelry findings Seeking the port number BT FTP QQ Xunlei and other ports used for the usual use

2 thoughts on “wholesale vintage brass jewelry findings Commonly used port number”

  1. wholesale jewelry for resale pittsburggh The common

    The computer "port" is a righteous translation of the English Port. It can be considered as an exit of computer communication between computers and external communication. The ports of the hardware field are also called interfaces, such as: USB port, serial port, etc. Port in the field of software generally refers to a communication protocol port facing connection services and non -connected services in the network. It is an abstract software structure, including some data structures and I/O (basic input and output) buffer.

    The portrayal can be divided into 3 categories:

    (1) Acknowledged port (Well Known Ports): Some services. Generally, the communication of these ports clearly shows the agreement of a certain service. For example: Port 80 is always http communication.

    (2) Registration port (Ports): from 1024 to 49151. They are loosely bound to some services. In other words, many services are bound to these ports, which are also used for many other purposes. For example: many system processing dynamic ports start from about 1024.

    (3) Dynamic and/or private ports (Dynamic and/or Private Ports): from 49152 to 65535. Theoretically, these ports should not be allocated for services. In fact, machines usually allocate dynamic ports from 1024. But there are exceptions: SUN's RPC port starts from 32768.

    It portable ports are often used by hackers, and some Trojan virus will be used to attack the computer system. The following is a brief way to introduce the computer port and prevent hackers from being attacked.

    8080 port

    Owal: Port 8080 is the same as port 80, which is used for www agent services. Web page browsing can be achieved. When you add the ": 8080" port number, such as: 8080.

    Portal vulnerabilities: Port 8080 can be used by various virus programs. For example, brown orifice (BRO) Troy Trojan virus can use port 8080 to completely remotely controlled infected computers. In addition, Ringzero Trojan can also use this port to attack.

    Ip operation suggestions: Generally, we use port 80 to browse web. In order to avoid the virus attack, we can turn off the port.

    : 21

    Service: FTP

    Instructions: The port open by the FTP server is used for uploading and downloading. The most common attacker is used to find a way to open the ANYMOUS FTP server. These servers have readable directory. Trojan Doy Trojan, Fore, Invisible FTP, Webex, WinCrash, and Blade Runner's port.

    : 22

    Service: SSH

    Instructions: The connection of the established TCP and this port may be to find SSH. There are many weaknesses in this service. If configured into a specific mode, many versions of the RSAREF library will have many vulnerabilities.

    : 23

    Service: Telnet

    Instructions: Remote login, the invaders search for remote login UNIX services. In most cases, scanning this port is to find the operating system of the machine running. There are other technologies, and the invaders will also find a password. Trojan Tiny Telnet Server opens this port.

    : 25

    service: SMTP

    Instructions: The port open by the SMTP server is used to send emails. The invaders are looking for the SMTP server to convey their SPAM. The intruder's account is closed, and they need to connect to the high-bandwidth E-mail server to pass the simple information to different addresses. Trojans Antigen, Email Password Sender, HAEBU COCEDA, Shtrilitz Stealth, WinPC, Winspy are all open this port.

    : 53

    dns service
    nDns refers to: domain name server. The domain name and IP address on the Internet correspond to one -to -one correspondence. Although the domain name is convenient for people's memory, the machine can only understand the IP address between the machines. The conversion work between them is called domain name analysis. The analysis server is completed, and the DNS is the server for domain name analysis.

    : 80

    Service: http

    Instructions: Used for web browsing. Trojan Executor opens this port.

    : 102

    Service: MESSAGE Transfer Agent (MTA) -X.400 Over TCP/IP

    Instructions: Message transmission proxy.

    : 109

    Service: Post Office Protocol -Version3

    Instructions: POP3 server opens this port for receiving emails, client access Server email service. Pop3 services have many recognized weaknesses. There are at least 20 weaknesses about the overflowing of username and password exchange buffer, which means that the invaders can enter the system before they really land. After successful landing, there are other buffer overflow errors.

    port: 110

    service: SUN's RPC service all port POP3 used port

    Instructions: Common RPC services include RPC.Mountd, NFS NFS, NFS , RPC.Statd, RPC.CSMD, RPC.TTYBD, AMD, etc. The news transmission protocol of the news group is carried on the USENET communication. The connection of this port is usually looking for the Usenet server. Most ISP restrictions, only their customers can access their news group server. Opening the news group server will allow post/read anyone's posts, access the restricted news group server, and anonymous posts or send spam.

    : 135

    Service: Location Service

    Instructions: Microsoft runs DCE RPC END-POINT MAPPER on this port for its DCOM service. This is very similar to the function of the Unix 111 port. Use DCOM and RPC services to register their positions with End-Point Mapper on the computer. When the remote client is connected to the computer, they find End-Point Mapper to find the location of the service. Is the port of Hacker scan the computer to find the Exchange Server running on this computer? What version? There are also some DOS attacks directly targeting this port.

    port: 137, 138, 139

    service: Netbios name service

    Instructions: 137, 138 are UDP ports, when the neighbors are used online neighbors online neighbors Use this port when transmitting files. Port 139: Try to get Netbios/SMB services through the connection to this port. This protocol is used for Windows files and printers sharing and Samba. And Wins also use it.

    : 161

    Service: SNMP

    Instructions: SNMP allows remote management equipment. All configuration and running information are stored in the database, and this information can be obtained through SNMP. Many administrators' error configurations will be exposed to Internet. CACKERS will try to access the system with the default password PUBLIC and Private. They may test all possible combinations. The SNMP package may be wronged by the user's network

    : 3389

    Windows remote terminal

    Terminal service can support many remote desktop at the same time Connect, but ordinary remote desktop can only be supported ~ several remote desktop connections (seemingly six, forgot), but terminal services have time limit. If there is no time limit, you can help Microsoft to buy terminals The number of users (expensive ~!), Or how to crack the Internet.

Leave a Comment