wholesale stainless steel jewelry usa Where to open or view the port

wholesale stainless steel jewelry usa

3 thoughts on “wholesale stainless steel jewelry usa Where to open or view the port”

  1. accessory jewelry wholesale Computer "port" is the translation of English Port, which can be considered as an exit of computer communication with external communication. The ports of the hardware field are also called interfaces, such as: USB port, serial port, etc. Port in the field of software generally refers to a communication protocol port facing connection services and non -connected services in the network. It is an abstract software structure, including some data structures and I/O (basic input and output) buffer.

    The portrayal can be divided into 3 categories:

    (1) Acknowledged port (Well Known Ports): Some services. Generally, the communication of these ports clearly shows the agreement of a certain service. For example: Port 80 is always http communication.

    (2) Registration port (Ports): from 1024 to 49151. They are loosely bound to some services. In other words, many services are bound to these ports, which are also used for many other purposes. For example: many system processing dynamic ports start from about 1024.

    (3) Dynamic and/or private ports (Dynamic and/or Private Ports): from 49152 to 65535. Theoretically, these ports should not be allocated for services. In fact, machines usually allocate dynamic ports from 1024. But there are exceptions: SUN's RPC port starts from 32768.

    It portable ports are often used by hackers, and some Trojan virus will be used to attack the computer system. The following is a brief way to introduce the computer port and prevent hackers from being attacked.

    8080 port

    Owal: Port 8080 is the same as port 80, which is used for www agent services. Web page views can be achieved. When the server is, the ": 8080" port number is added, such as: 8080.

    Portal vulnerabilities: Port 8080 can be used by various virus programs. For example, brown orifice (BRO) Troy Trojan virus can use port 8080 to completely remotely controlled infected computers. In addition, Ringzero Trojan can also use this port to attack.

    Ip operation suggestions: Generally, we use port 80 to browse web. In order to avoid the virus attack, we can turn off the port.

    : 21
    Service: FTP
    Instructions: The port open by the FTP server is used for uploading and downloading. The most common attacker is used to find a way to open the ANYMOUS FTP server. These servers have readable directory. Trojan Doy Trojan, Fore, Invisible FTP, Webex, WinCrash, and Blade Runner's port.

    : 22
    Service: SSH
    Instructions: The connection of the established TCP and this port may be to find SSH. There are many weaknesses in this service. If configured into a specific mode, many versions of the RSAREF library will have many vulnerabilities.

    : 23
    Service: telnet
    Instructions: Remote login, the invaders search for remote login UNIX services. In most cases, scanning this port is to find the operating system of the machine running. There are other technologies, and the invaders will also find a password. Trojan Tiny Telnet Server opens this port.

    : 25
    Service: SMTP
    Instructions: The port open by the SMTP server is used to send emails. The invaders are looking for the SMTP server to convey their SPAM. The intruder's account is closed, and they need to connect to the high-bandwidth E-mail server to pass the simple information to different addresses. Trojans Antigen, Email Password Sender, HAEBU COCEDA, Shtrilitz Stealth, WinPC, Winspy are all open this port.

    : 80
    Service: http
    Instructions: Used for web browsing. Trojan Executor opens this port.

    : 102
    Service: Message transfer agent (MTA) -X.400 Over TCP/IP
    Instructions: Message transmission proxy.

    : 109
    Service: Post Office Protocol -Version3
    Instructions: POP3 server is open to this port for receiving email services on the server. Pop3 services have many recognized weaknesses. There are at least 20 weaknesses over the overflow of the username and password switching buffer, which means that the intruder can enter the system before the actual landing. After successful landing, there are other buffer overflow errors.

    port: 110
    service: SUN's RPC service all ports
    Note: Common RPC services include RPC.Mountd, NFS, RPC.STATD, RPC.CSMD, RPC. TTYBD, AMD, etc.

    : 119
    Service: Network News Transfer Protocol
    Instructions: NEWS news group transmission protocol, carrying USENET communication. The connection of this port is usually looking for the Usenet server. Most ISP restrictions, only their customers can access their news group server. Opening the news group server will allow post/read anyone's posts, access the restricted news group server, and anonymous posts or send spam.

    : 135
    service: Location Service
    Instructions: Microsoft runs DCE RPC End-Point Mapper on this port for its DCOM service. This is very similar to the function of the Unix 111 port. Use DCOM and RPC services to register their positions with End-Point Mapper on the computer. When the remote client is connected to the computer, they find End-Point Mapper to find the location of the service. Is the port of Hacker scan the computer to find the Exchange Server running on this computer? What version? There are also some DOS attacks directly targeting this port.

    : 137, 138, 139
    Services: Netbios name service
    Instructions: 137 and 138 are UDP ports, using this port when transmitted files through online neighbors. Port 139: Try to get Netbios/SMB services through the connection to this port. This protocol is used for Windows files and printers sharing and Samba. And Wins also use it.

    port: 161
    service: SNMP
    Instructions: SNMP allows remote management equipment. All configuration and running information are stored in the database, and this information can be obtained through SNMP. Many administrators' error configurations will be exposed to Internet. CACKERS will try to access the system with the default password PUBLIC and Private. They may test all possible combinations. The SNMP package may be directed to the user's network
    ------------------------------------------------------------------------ ---
    It to check the port in Windows 2000/XP/Server 2003, you can use the NetStat command:
    "Start"> "Run"> "CMD", open the command prompt window window. Type "NetStat -A -N" in the command prompt state. After pressing the Enter key, you can see the port number and status of the TCP and UDP connection displayed in the form. A. -- � � o -
    -a indicates that the TCP connection of all activities and the computer monitoring TCP and UDP ports.
    -e indicates the number of bytes and data packets sent and received by Ethernet.
    -n means that only the address and port number of the TCP connection of all activities in the form of digital form.
    -O indicates that the TCP connection of the activity is displayed and includes the process ID (PID) of each connection.
    -s represents statistical information that displays various connections according to the protocol, including the port number.
    Turn off the port
    For example, if you close the 25 port of SMTP service in Windows 2000/XP, you can do this: first open the "control panel", double -click "management tool", and double -click "service". Then find and double -click the "Simple Mail Transfer Protocol (SMTP)" service in the open service window, click the "Stop" button to stop the service, then select "Disable" in the "Starting Type", and finally click "OK "The button can. In this way, closing the SMTP service is equivalent to closing the corresponding port.
    In the port
    If you want to open this port, just select "Auto" in the "Starting Type", click the "OK" button, and then open the service, and click "Start" in "Service Status" The button can be enabled to use the port, and finally, click the "OK" button.
    It, in the network connection attribute, select the "TCP/IP protocol" attribute, open the high -end TCP/IP settings, and open the TCP/IP screening on the page of the option. Open and close the port, the default is not enabled TCP/IP screening.

Leave a Comment