When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. List of TCP and UDP port numbers - Wikipedia

    en.wikipedia.org/wiki/List_of_TCP_and_UDP_port...

    Despite this port being assigned by IANA, the service is meant to work on SPP (ancestor of IPX/SPX), instead of TCP/IP. [36] 53: Yes: Domain Name System (DNS) [37] [11] 54: Assigned: Xerox Network Systems (XNS) Clearinghouse (Name Server). Despite this port being assigned by IANA, the service is meant to work on SPP (ancestor of IPX/SPX ...

  3. Remote Shell - Wikipedia

    en.wikipedia.org/wiki/Remote_Shell

    The remote shell (rsh) is a command-line computer program that can execute shell commands as another user, and on another computer across a computer network. The remote system to which rsh connects runs the rsh daemon (rshd). The daemon typically uses the well-known Transmission Control Protocol (TCP) port number 513.

  4. Banner grabbing - Wikipedia

    en.wikipedia.org/wiki/Banner_grabbing

    However, an intruder can use banner grabbing in order to find network hosts that are running versions of applications and operating systems with known exploits. Some examples of service ports used for banner grabbing are those used by Hyper Text Transfer Protocol ( HTTP ), File Transfer Protocol ( FTP ), and Simple Mail Transfer Protocol ( SMTP ...

  5. Open port - Wikipedia

    en.wikipedia.org/wiki/Open_port

    Malicious ("black hat") hackers commonly use port scanning software to find which ports are "open" (unfiltered) in a given computer, and whether or not an actual service is listening on that port. They can then attempt to exploit potential vulnerabilities in any services they find.

  6. IEEE 802.1X - Wikipedia

    en.wikipedia.org/wiki/IEEE_802.1X

    802.1X-2001 defines two logical port entities for an authenticated port—the "controlled port" and the "uncontrolled port". The controlled port is manipulated by the 802.1X PAE (Port Access Entity) to allow (in the authorized state) or prevent (in the unauthorized state) network traffic ingress and egress to/from the controlled port.

  7. Next-generation firewall - Wikipedia

    en.wikipedia.org/wiki/Next-generation_firewall

    In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations.

  8. Secure Real-time Transport Protocol - Wikipedia

    en.wikipedia.org/wiki/Secure_Real-time_Transport...

    The Secure Real-time Transport Protocol (SRTP) is a profile for Real-time Transport Protocol (RTP) intended to provide encryption, message authentication and integrity, and replay attack protection to the RTP data in both unicast and multicast applications.

  9. Port scanner - Wikipedia

    en.wikipedia.org/wiki/Port_scanner

    A port scanner is an application designed to probe a server or host for open ports.Such an application may be used by administrators to verify security policies of their networks and by attackers to identify network services running on a host and exploit vulnerabilities.