vintage reproduction jewelry wholesale How to open the port (talk about specific points)

vintage reproduction jewelry wholesale I want to know what is going on with the port, and how to open some commonly used ports, please advice from the masters (hope to talk about it in detail). Can list some examples.

2 thoughts on “vintage reproduction jewelry wholesale How to open the port (talk about specific points)”

  1. new wholesale jewelry The port is opened by the program or service. For example, if you install a program, this program can be connected to the Internet. When connected to the Internet, it will open a port, connect to the opposite port, and then transmit the data of the data

  2. wholesale jewelry in bali Port concept
    In network technology, ports (PORT) roughly have two meanings: one is ports in the physical sense, such as ADSL MODEM, hub, switch, and router to connect to other network devices interfaces, such as RJ -45 port, SC port, etc. The second is the portion in the logical sense, generally refers to the port in the TCP/IP protocol. The range of the port number is from 0 to 65535, such as port 80 for browsing web services, 21 ports for FTP services, and so on. What we will introduce here is the portion in the logical sense.

    It port classification
    The ports in the logical sense have multiple classification standards. Below will introduce two common classifications:

    1. n
    (1) Well-Known Ports
    The well-known port is the well-known port number. The range is from 0 to 1023. These port number is generally fixed to some services. For example, port 21 is allocated to the FTP service, port 25 is assigned to SMTP (simple mail transmission protocol) service, port 80 is assigned to HTTP service, port 135 is assigned to RPC (remote process call) service, and so on.

    (2) Dynamic port (Dynamic Ports)
    The range of dynamic ports from 1024 to 65535. These port number is generally not fixed to a service, which means that many services can be used in use These ports. As long as the running program is applied to the system to access the network, the system can allocate a program from these port numbers for this program. For example, port 1024 is the process to send an application to the first to the system. After closing the program process, the port number is released.

    However, dynamic ports are often used by the virus Trojan program. For example, the Binghe's default connection port is 7626, Way 2.4 is 8011, netspy 3.0 is 7306, YAI virus is 1024 and so on.

    2. Divide it according to the type of protocol
    If is divided according to protocol type, it can be divided into ports such as TCP, UDP, IP, and ICMP (Internet control message protocol). The following mainly introduces TCP and UDP ports:

    (1) The TCP port
    TCP port, that is, the transmission control protocol port, which needs to be connected between the client and the server. This can provide reliable data to provide reliable data transmission. Common port 21 of FTP services, 23 ports for Telnet services, port 25 of SMTP services, and port 80 of HTTP services and so on.

    (2) UDP port
    udp port, that is, the user packet protocol port, does not need to establish a connection between the client and the server, and the security is not guaranteed. Common ports of DNS services, 161 ports for SNMP (Simple Network Management Agreement) services, 8000 and 4000 ports used by QQ, and so on.

    The view port
    The portrayal port in Windows 2000/XP/Server 2003, you can use the NetStat command:

    Click "Start → Run" in turn, type "Run", and type " CMD "Enter the car and open the command prompt window window. Type the "NetStat -A -N" in the command prompt state. After pressing the Enter key, you can see the end number and state of the TCP and UDP connection displayed in the form.

    The knowledge: NetStat command usage
    command format: NetStat -A -E -O -S

    -a represents the TCP connection of all activities and computer monitoring of computer monitoring TCP and UDP ports.

    -e indicates the number of bytes, data packets sent and received by Ethernet.

    -n means that only the address and port number of the TCP connection of all activities in the form of digital form.

    -o indicates the TCP connection of the activity and includes the process ID (PID) of each connection.

    -s means displaying statistics from various connections according to the protocol, including the port number.

    Turn off/open port
    before introducing the role of various ports, let's introduce how to close/open the port in Windows, because there are many unsafe or unsafe or unsatisfactory or unsatisfactory or unsatisfactory or unsatisfactory. No ports are opened, such as port 23 of Telnet services, port 21 of FTP services, port 25 of SMTP services, port 135 of RPC services, and so on. In order to ensure the security of the system, we can close/open the port through the following methods.

    Turn off the port
    For example, closing the SMTP service 25 port of SMTP service in Windows 2000/XP, you can do this: first open the "control panel", double -click "management tool", double -click "service" Essence Then find and double -click "Simple Mail Transfer Protocol (SMTP)" service in the open service window, click the "Stop" button to stop the service, then select "Disable" in "Starting Type", and finally click "OK "Buttons. In this way, closing the SMTP service is equivalent to closing the corresponding port.

    In open port
    If you want to open this port, just first select the type "automatic" automatic "automatic" button, then open the service, and in the "service status" single single single single single single, single in the "service status" single single single single Click the "Start" button to enable the port, and finally, click the "OK" button.

    This: There is no "service" option in Windows 98. You can use the rules of the firewall to set the function to close/open the port.

    M common network port

    21 port
    Portal description: 21 ports are mainly used for FTP (File Transfer Protocol, file transmission protocol). The upload and download of the files between the two computers. One computer is used as an FTP client and the other is the FTP server. It can log in to the FTP server with anonymous login and authorization user name and password login. At present, the transmission of files through FTP services is the most important way to upload and download files on the Internet. In addition, there is a default port of port 20 ports for FTP data transmission.

    It can provide FTP connection and management through the Internet information service (IIS) in Windows, or you can install FTP server software separately to implement FTP functions, such as common FTP SERV-U.

    If operation suggestions: Because some FTP servers can log in by anonymous, they are often used by hackers. In addition, port 21 will be used by some Trojans, such as Blade Runner, FTP TROJAN, DOLY TROJAN, Webex and so on. If you do not set up an FTP server, it is recommended to close port 21.

    23 port
    Portal description: port 23 is mainly used for Telnet (remote login) service. It is a login and simulation program commonly used on the Internet. Also need to set the client and server side. The client that opens the Telnet service can log in to the remote Telnet server and log in to the authorized username and password. After logging in, the user allows the user to use the command prompt window to perform the corresponding operation. In Windows, you can type the "Telnet" command in the command prompt window to use Telnet remote login.

    If operation suggestions: Using Telnet service, hackers can search for remote login UNIX services to scan the type of operating system. And there are many serious loopholes in the Telnet service in Windows 2000, such as increasing permissions and refusing services, which can collapse the remote server. The 23 port of the Telnet service is also the default port of TTS (Tiny Tiny Telnet Server) Trojan. Therefore, it is recommended to close port 23.

    It we introduce the method of closing/opening ports, and introduce the contents of port 21 and 23. Below will introduce other common port descriptions and corresponding operation suggestions.

    25 port
    It port description: port 25 is SMTP (SIMPLE MAIL Transfer Protocol, Simple Mail Transmission Protocol) server, mainly used to send emails. protocol. For example, when we use the email client program, when creating an account, we will request the input SMTP server address. The server address is used by default. R n1. Using port 25, hackers can find the SMTP server to forward spam.

    2. 25 ports are opened by many Trojan programs, such as AJAN, Antigen, Email Password SenDer, Promail, Trojan, Tapiras, WinPC, Winspy and so on. Take Winspy, for example, through open 25 ports, you can monitor all windows and modules running by the computer.

    If operation suggestions: If you are not set up the SMTP mail server, you can close the port.

    53 port
    If port description: Port 53 is open for DNS (domain name server, domain name server) server. It is mainly used for domain name analysis. DNS services are used most widely in NT systems. Through the DNS server, you can realize the conversion between the domain name and the IP address. As long as you remember the domain name, you can quickly access the website.

    Portal vulnerabilities: If the DNS service is opened, hackers can directly obtain the IP address of hosts such as web servers by analyzing the DNS server, and then use port 53 to break through some unstable firewalls to implement attacks. Recently, a company in the United States also announced 10 vulnerabilities that were most likely to be attacked by hackers, the first of which was the Bind vulnerability of the DNS server.

    If operation suggestions: If the current computer is not used to provide domain name analysis services, it is recommended to turn off the port.

    67, 68, 68
    Points: port 67, 68 are Bootstrap Protocol Server (guidance program protocol service terminals) and Bootstrap Protocol Client (guide program protocol client). Port. Bootp service is a remote start -up protocol generated in the early UNIX. The DHCP service we often use now is expanded from the bootp service. Bootp services can dynamically allocate IP addresses for the computer in the LAN without requiring each user to set the static IP address.

    Portal vulnerabilities: If the BOOTP service is opened, it is often used by hackers to use a distributed IP address as a local router to attack through the "man".

    If operation suggestions: It is recommended to turn off the port.

    It we introduced above the 25 port for SMTP services, ports 53 of DNS servers, and port 67 and 68 for BOOTP services. Below will be introduced to port 69 for TFTP, for FINERER The 79 port of the service and the 80 port for HTTP services.

    69 port
    It port description: port 69 is open for TFTP (Trival File Transfer Protocol, secondary file transmission protocol). TFTP is a simple file transmission protocol developed by CISCO. In FTP. However, compared with FTP, TFTP does not have complex interactive access interfaces and authentication control. The service is suitable for data transmission between clients and servers that do not require complex exchange environment.

    Portal vulnerabilities: Many servers and bootp services provide TFTP services together, which are mainly used to download the starting code from the system. However, because the TFTP service can be written in the file in the system, and the hacker can also use TFTP's error configuration to obtain any file from the system.

    If operation suggestions: It is recommended to turn off the port.

    79 port
    If port description: port 79 is open for FINGER service, mainly used to query the detailed information of remote host online users, operating system types, and whether the buffer overflow. For example, to display the information of the user01 user on the remote computer, you can type "Finger User01@" in the command line.

    It port vulnerabilities: Generally, hackers want to attack each other's computer. They all obtain relevant information through the corresponding port scanning tools. Obtaining user information can also detect known buffer overflow errors. In this way, it is easy to encounter a hacker attack. Moreover, port 79 is also used by Trojan as the default port.

    If operation suggestions: It is recommended to turn off the port.

    80 port
    It port description: Port 80 is open for HTTP (Hypertext Transport Protocol). Wide Web, Wanwei.com) Agreement on the transmission information on service. We can access the website through the http address ": 80" (that is, "URL"), such as: 80, because the default port number of the web service is 80, so as long as you enter the URL, you don't need to enter ": 80". Essence

    Portal vulnerabilities: Some Trojans can use port 80 to attack the computer, such as Executor, Ringzero, etc.

    Ip operation suggestions: In order to surf the Internet normally, we must turn on port 80.

    In the introduction above, we understand that port 69 ports for TFTP services, port 79 ports for FINGER services, and Internet surfing on the Internet for WWW services are used for WWW services. The following will introduce the more strange port 99, port 109, 110 and RPC services for POP3 services.

    99 Port
    If port description: port 99 is used for a service called "Metagram Relay" (Asian counterpart delay). This service is relatively rare and is generally not used.

    Portal vulnerabilities: Although the "Metagram Relay" service is not commonly used, Trojan programs such as Hidden Port and NCX99 will use this port. For example, in Windows 2000, NCX99 can make CMD. EXE program is bound to port 99 so that Telnet can be connected to the server, adding users and changing permissions at will.

    If operation suggestions: It is recommended to turn off the port.
    109, 110 port
    If port description: Port 109 is open for POP2 (Post Office Protocol Version 2, post office agreement 2) The service is open. Port 110 is open for POP3 (Mail Agreement 3). POP3 is mainly used to receive emails. At present, POP3 is used more. Many servers support POP2 and POP3 at the same time. The client can use the POP3 protocol to access the mail service on the service side. Now most of the ISP mail servers use the protocol. When using an email client program, you will request the POP3 server address. By default, the 110 port

    It port loopholes Many loopholes. There are no less than 20 vulnerabilities over the overflowing of the user name and password exchange buffer. For example, the pop3 server legal user name information leakage vulnerabilities can verify the existence of the user account through this vulnerability remote attacker. In addition, Port 110 is also used by Trojan programs such as Promail Trojan, and the user name and password of the POP account can be stolen through port 110.

    Ip operation suggestions: If it is executed by the mail server, you can open the port.

    111 Port
    If port description: Port 111 is the port of the RPC (Remote Procererr, remote process call) service, which is mainly used for the internal process of different computers in distributed systems Communication and RPC are important components in various network services. Common RPC services include RPC. Mountd, NFS, RPC. STATD, RPC. CSMD, RPC. TTYBD, AMD and so on. In Microsoft's Windows, RPC services are also available.

    Portal vulnerabilities: SUN RPC has a relatively large vulnerability, that is, the XDR_ARRAY function has remote buffer overflow vulnerabilities during multiple RPC services.

    It we introduced port 99, which is unknown but easily attacked by Trojan, Port 109, 110, which is common for POP services, and 111 ports for RPC services for SUN. The following will introduce 113 ports that are closely related to many network services, 119 ports transmitted by the news group, and port 135 that encountered the "shock wave" attack.

    113 port
    Portal description: Port 113 is mainly used for Windows "Service" (verification service). Generally, the computer connected to the network runs the service. You can get information connected to the computer through this service. In Windows 2000/2003 Server, there are special IAS components, which can facilitate authentication and strategic management through this component.

    Portal vulnerabilities: although port 113 can facilitate identity verification, it is often used as recorders such as FTP, POP, SMTP, IMAP, and IRC. For example, a Trojan -controlled Trojan -controlled IRC chat room. In addition, Port 113 is the default open ports such as Invisible Identd Deamon, Kazimas and other Trojans.

    The operation recommendation: Jianyao 乇 乇 乇 凇 凇?/P>

    119 port
    Portal description: 119 port is "network news transfer propocol" (network "(network" (network The news group transmission protocol, referred to as NNTP), is mainly used for the transmission of the news group. This port is used when finding the USENET server.

    Portal vulnerabilities: The famous HAPPY99 worm virus is open to port 119 by default. If the virus is hit, email will be continuously transmitted and causing network blockage.

    If operation suggestions: If you often use the Usenet news group, you should pay attention to turn off the port from time to time.

    135 port
    Portal description: port 135 is mainly used to use RPC (Remote Procererr, remote process call) protocol and provide DCOM (distributed component object model) services. A program running on a computer can smoothly execute the code on the remote computer; using DCOM can directly communicate through the network, which can transmit it across a variety of networks including the HTTP protocol.

    Portal vulnerabilities: I believe that last year, many Windows 2000 and Windows XP users were involved in the "shock wave" virus. The virus used RPC vulnerabilities to attack the computer. The RPC itself has a vulnerability in the message exchange part of the TCP/IP. The vulnerability is caused by the incorrect message of the incorrect processing format. This vulnerability affects a interface between RPC and DCOM, and the port of the interface is 135.

    Ip operation suggestions: In order to avoid the attack of the "shock wave" virus, it is recommended to turn off the port.

    The introduction through the above introduction must have learned that Port 113 is used to verify services, ports 119 for network news groups, and port 135 used by the "shock wave" virus. The following author will introduce ports 137 for Netbios name services, for Windows files and printer shared port 139 and 143 ports of the IMAP protocol.

    137 port
    Portal description: port 137 is mainly used for "netbios name service" (Netbios name service). It belongs to the UDP port. Users only need to use a computer on a local area or the Internet. Port 137 Send a request to get information of the computer's name, registered user name, and whether the main domain controller is installed, whether IIS is running.

    Portal vulnerabilities: Because it is UDP port, for attackers, it is easy to obtain the relevant information of the target computer by sending requests. Serve. In addition, by capturing the information package that is using port 137 to communicate, it may also get the start and closing time of the target computer, so that you can use special tools to attack.

    If operation suggestions: It is recommended to turn off the port.

    139 port
    Portal description: Port 139 is provided for "netbios session service", which is mainly used to provide Windows file and printer sharing and the Samba service in Unix. To sharing files in the local area network in Windows, the service must be used. For example, in Windows 98, you can open "Control Panel", double -click the "network" icon, and click the "file and print sharing" button in the "Configuration" tab to select the corresponding settings to install and enable the service; in Windows 2000/ In XP, you can open the "Control Panel", double -click the "network connection" icon to open the local connection attribute; then, select the "Internet protocol (TCP/IP)" in the "Conventional" tab of the attribute window, click "Properties" to click "Properties" Button; then in the open window, click the "Advanced" button; select the "WINS" tab in the "Advanced TCP/IP Settings" window, and enable the Netbios on the TCP/IP in the "Netbios Settings" area.

    It port vulnerabilities: Although the port 139 ports can be provided, it is often used by attackers for attacks, such as using flowing, SuperScan and other port scan tools. With loopholes, it is very dangerous to try to obtain the username and password.

    If operation suggestions: If you do not need to provide files and printers sharing, it is recommended to turn off the port.

    It we introduced above the 137 port that can obtain information such as remote computer names, and provides Windows and port 139 ports shared by files and printers. The following will introduce port 143 ports for email receiving services (IMAP), port 161 for SNMP services, and port 443 for HTTPS services.

    143 port
    Portal description: Port 143 is mainly used for "Internet Message Access Protocol" V2 (Internet message access protocol, referred to as IMAP). Agreement. Through the IMAP protocol, we can know the content of the letter without receiving the email and facilitate the management of emails in the server. However, it is more responsible for the POP3 protocol. Today, most of the mainstream email client software supports the protocol.

    Portal vulnerabilities: Like port 110 of the POP3 protocol, the 143 port used in IMAP also has a buffer overflow vulnerability. Through the vulnerability, the username and password can be obtained. In addition, there is a Linux worm virus called "ADMV0RM" using this port for reproduction.

    If operation suggestions: If it is not operated by the IMAP server, the port should be closed.

    161 port
    Portal description: port 161 is used for "Simple Network Protocol" (simple network management protocol, referred to as SNMP). In Windows, the SNMP service can provide status information on TCP/IP networks and various network devices. At present, almost all network equipment manufacturers have achieved support for SNMP.

    The SNMP service in Windows 2000/XP. We can first open the "Windows Component Wizard", select "Management and Surveillance Tools" in "Components", click the "Detailed Information" button to just click on the button. You can see the "Simple Network Management Agreement (SNMP)" and select the component; then, click "Next" to install.

    Portal vulnerabilities: Because the status information of various devices in the network can be obtained through SNMP, and it can also be used to control the network device, hackers can completely control the network through SNMP vulnerabilities.

    If operation suggestions: It is recommended to turn off the port.

    443 port
    Portal description: port 443 is the web browsing port, which is mainly used for HTTPS service, which is another HTTP that provides encryption and transmission through the security port. On some websites with high security requirements, such as banks, securities, shopping, etc., HTTPS services are used, so that other people on the exchange information on these websites cannot see the security of transactions. The address of the webpage starts, not common.

    It port vulnerabilities: HTTPS service is generally guaranteed by SSL (convergence layer), but SSL vulnerabilities may be attacked by hackers. For example Credit card account, etc.

    If operation suggestions: It is recommended to open this port for access to security web pages. In addition, in order to prevent hackers from attacks, Microsoft should be installed in time to install the latest security patch released by SSL vulnerabilities.

    554 port
    Portal description: Port 554 is used for "Real Time Streaming Protocol" (real -time stream protocol, referred to as RTSP). The protocol can be transmitted to the streaming document to play by the Internet, and can use limited network bandwidth to maximize the use of limited network bandwidth. The transmitted streaming files are generally published by the real server, including .rm and .ram. Today, many download software supports RTSP protocols, such as Flashget, audio and video conveyor belts, and so on.

    Portal vulnerabilities: At present, the vulnerabilities found in the RTSP protocol are mainly the early release of Helix University Server. There is a buffer overflow vulnerability. Relatively speaking, the 554 port used is safe.

    Ip operation suggestions: In order to appreciate and download streaming documents that can be downloaded to the RTSP protocol, it is recommended to open Port 554.

    1024 port
    Portal description: Port 1024 is generally not fixed to a certain service. The explanation in English is "reserved". Previously, we mentioned that the range of the dynamic port was from 1024 to 65535, and 1024 was the beginning of the dynamic port. This port is generally allocated to the first service to the system. When the service is turned off, the 1024 port will be released to wait for the call of other services.

    It port vulnerabilities: The famous YAI Trojan virus defaults to use port 1024. Through the Trojan horse, you can remotely control the target computer to obtain the screen image, record keyboard events, and obtain passwords. of.

    If operation suggestions: General anti -virus software can be easily checked by YAI virus, so it is recommended to open the port when confirming that the YAI virus is confirmed.

    1080 port
    Portal description: Port 1080 is a port used by SOCKS proxy services. The WWW service used by everyone usually uses the HTTP protocol for proxy services. The SOCKS agency service is different from the HTTP proxy service. It cross the firewall by channel, which allows users behind the firewall to access the Internet via an IP address. SOCKS proxy services are often used in the local area network. For example, if QQ is limited, then you can open the QQ parameter settings window, select "Network Settings", and set SOCKS proxy services (Figure 1). In addition, you can use QQ to use SOCKS proxy software, such as, etc.

    It port vulnerabilities: The default port of the famous proxy server software is 1080, which uses this port to realize the sharing of computer -sharing in the local area network. However, worm viruses such as Worm.bugbear.b (monster II), Worm.novarg.b (SCO Bomb variant B) will also listen to port 1080 on the local system, which will be unfavorable to the security of the computer.

    Plip operation suggestions: In addition to using Wingate to share the Internet, then other suggestions to close the port.

    1755 port
    Portal description: Port 1755 is used for "Microsoft Media Server" (Microsoft Media Server, referred to as MMS) by default. The protocol can be transmitted and played by the streaming files in the Windows Media server on the Internet. These files include .ASF, .WMV, etc., you can use Windows Media Player and other media to play software to play in real time. Among them, specifically, port 1755 can be divided into TCP and UDP MMS protocols, MMST and MMSU, which are generally used in TCP MMS protocols, namely MMST. At present, most of the streaming media and ordinary download software support the MMS protocol.

    It port vulnerabilities: From the perspective of Microsoft officials and users using MMS protocols and play streaming media files, there are no particularly obvious vulnerabilities. The main one is the MMS protocol and firewall and NAT (network address conversion ) Compatibility with compatibility.

    If operation suggestions: In order to play and download to the MMS protocol in real time, it is recommended to open the port.

    The portion 4000 ports used by QQ will be introduced below, port 5554 portion used by the "vibration wave" virus, port 5632 ports and 8080 ports used in WWW agent services.

    4000 port
    Portal description: The 4000 port is used for QQ chat tools that everyone often uses. Essence Through port 4000, the QQ client program can send information to the QQ server to achieve authentication and message reposting. The messages sent between QQ users are transmitted by this port by default. Both 4000 and 8000 ports belong to the TCP protocol, but belong to the UDP protocol.

    Portal vulnerabilities: Because port 4000 belongs to the UDP port, although the message can be transmitted directly, there are various vulnerabilities, such as Worm_witty.a (Vidy) worm virus is to send 4000 ports to random IP to send random IP send The virus and disguised into ICQ packets, the consequence is to write random data to the hard disk. In addition, Trojan.skydance Trojama virus also uses this port.

    Ip operation suggestions: In order to chat with QQ, it is okay to open the 4000 door.

    5554 port
    Portal description: On April 30 this year, a new worm virus that serves Microsoft LSASS -The virus can be used. The TCP 5554 port turns on a FTP service, which is mainly used for the spread of viruses.

    Portal vulnerabilities: After the infection of the "vibration wave" virus, it will transmit the worm virus to other infected computers through port 554, and try to connect the TCP 445 port and send an attack. , Slowly running, unable to access the Internet normally, and even hackers can use the control of the system to seize the system.

    Ip operation suggestions: In order to prevent infection of the "vibration wave" virus, it is recommended to close the 5554 port.

    5632 Port
    Portal description: Port 5632 is the port opened by the remote control software that is familiar with. It is divided into TCP and UDP. Computer, check the remote computer screen, perform file transmission, and implement file synchronous transmission. After the PCANWhere is installed, the controlled computer will automatically scan the port.

    Portal vulnerabilities: You can control remote computers through the main control of the main control end of the 5632 -end port to perform various operations. It may be used by the criminals to steal accounts, steal important data, and perform various damage.

    Ip operation suggestions: In order to avoid scanning through the 5632 port and control the computer remotely, it is recommended to turn off the port.

    8080 Port
    Portal description: Port 8080 is the same as port 80, which is used for WWW agent services. Web page browsing can be achieved. Add ": 8080" port number, such as: 8080.

    Portal vulnerabilities: Port 8080 can be used by various virus programs. For example, brown orifice (BRO) Troy Trojan virus can use port 8080 to completely remotely controlled infected computers. In addition, Ringzero Trojan can also use this port to attack.

    Ip operation suggestions: Generally, we use port 80 to browse web. In order to avoid the virus attack, we can turn off the port.

    blog.sina/s/blog_ For more detailed content, see

    The reason I answered me

Leave a Comment