Welcome Guest Log In | Register

Ports and Trojans

Authored on: May 17, 2002

Technical Paper

0
More InfoLess Info


All trojans that access the Internet do so via one of the many ports on your machine. Ports are thus a key vulnerability on any Internet-connected PC. Port scanning is used to find weaknesses in a computer or network by scanning or probing system ports via requests for information. This PestPatrol technical white paper defines ports and trojans, and provides a useful list of ports commonly used by trojans.

For more information on Ports and Trojans, visit the PestPatrol Web site.
View
 

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page