Please contact me with any suggestions, corrections, or comments. I have placed a particular emphasis on home broadband network security. Some sites with good lists, as well as a variety of other security resources. So instead of trying to list every port here, I am just going to provide links to I have found many much better resources for trojan and insecure ports, Therefore, just because a port shows up, it doesn't necessarily mean that it has been Please note that unfortunately, trojans can use the same port number as legitimate services These are ports that you definitely want closed, possibly withįirewall alarms set on them to detect any external probes or internal compromise. That hackers use to break into your network. This page documents DANGEROUS TCP/IP ports, that are usedīy trojan horse and backdoor programs or that expose system vulnerabilities, That page lists ports that you might want to open or be aware of in order to Internet Service Providers - Free Software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |