What Is a Free Port?

"Port" is a free translation of English port, which can be considered as an outlet for communication between the device and the outside world. Ports can be divided into virtual ports and physical ports, where virtual ports refer to ports inside the computer or inside the switch router and are not visible. For example, 80 ports, 21 ports, 23 ports, etc. in the computer. Physical ports are also called interfaces, which are visible ports, RJ45 network ports on computer backplanes, RJ45 ports such as switch router hubs. The use of RJ11 jacks for phones also belongs to the category of physical ports.

Port is
If you compare an IP address to a house, the port is the door to and from the house. The real house has only a few doors, but there can be as many as 65536 (ie: 2 ^ 16) ports for an IP address! Port is through
We know that a host with an IP address can provide many services, such as
Friends who are new to the Internet are generally very sensitive to their own ports. They are always afraid that their computers have too many ports open, and they are even more afraid of having backdoor ports. Lift up the net to feel nervous. In fact, protecting your own port is not that difficult, just do the following:
1) View: often use commands or software to check the ports open locally to see if there are suspicious ports;
2) Judgment: If you are unfamiliar with the open ports, you should immediately find the port encyclopedia or common ports such as Trojans (there are many on the Internet), and look at the description of the role of your suspicious port, or open this through software viewing Port process to make judgments;
3) Close: If it is really a Trojan port or there is no description of this port in the information, then this port should be closed. You can block this port with a firewall
For more information, see the IANA website [2]
Some ports are often used by hackers and by some Trojan horses to attack computer systems. The following are
In simple terms, the methods of illegal intrusion can be roughly divided into 4 types:
1. Scan the port and break into the host through known system bugs.
2. Plant Trojans and use the back door opened by the Trojans to enter the host.
3. Use data overflow to force the host to provide a backdoor to enter the host.
4. Take advantage of certain software design vulnerabilities to directly or indirectly control the host.
The main methods of illegal intrusion are the first two, especially using some popular
Active Directory port and protocol requirements
Application servers, client computers, and domain controllers in a public or external forest have service dependencies to allow user and computer-initiated operations such as domain join, logon authentication, remote management, and Active Directory replication to work jobs. Such services and operations require network connectivity through specific ports and network protocols.
A comprehensive list of services, ports, and protocols required for member computers and domain controllers to interoperate or for application servers to access Active Directory includes, but is not limited to, the following:
Citing Active Directory-Dependent Services
Active Directory / LSA
Computer browser
Distributed file system
File Copy Service
Kerberos Key Distribution Center
Network login
Remote Procedure Call (RPC)
server
Simple Mail Transfer Protocol (SMTP) (if configured)
WINS (in Windows Server 2003 SP1 and later versions for backing up Active Directory replication operations if DNS does not work)
Windows time
World Wide Web Publishing Service
Services that require Active Directory services
Certificate Services (required for specific configurations)
DHCP server (if configured)
Distributed file system
Distributed Link Tracking Server (optional, but will be selected by default on Windows 2000 computers)
Distributed transaction coordinator
DNS server
Fax service (if configured)
File copy service.
Macintosh file server (if configured).
Internet authentication service (if configured).
License record (used by default).
Network login
Spooler.
Remote installation (if configured).
Remote procedure call (RPC) locator.
Remote storage notifications.
Remote storage server.
Routing and remote access
server.
Simple Mail Transfer Protocol (SMTP) (if configured)
terminal service
Terminal Services Licensing.
Terminal Services session directory.
To open the port:
Control Panel-windows firewall-exception-open the port you want to open or add another port you want to add.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?