datasheets.com EBN.com EDN.com EETimes.com Embedded.com PlanetAnalog.com TechOnline.com  
Events
UBM Tech
UBM Tech
Welcome Guest Log In | Register

Ports and Trojans

Authored on: May 17, 2002

Technical Paper

0 0
More InfoLess Info


All trojans that access the Internet do so via one of the many ports on your machine. Ports are thus a key vulnerability on any Internet-connected PC. Port scanning is used to find weaknesses in a computer or network by scanning or probing system ports via requests for information. This PestPatrol technical white paper defines ports and trojans, and provides a useful list of ports commonly used by trojans.

For more information on Ports and Trojans, visit the PestPatrol Web site.
View
 
0 comments
write a comment

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page