home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page409.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  92KB  |  817x1045  |  8-bit (256 colors)
Labels: computer | hakham | laptop | monitor
OCR: THE INTERNE 341 80. If a port is open and listening for requests on any computer, even your own hacker can exploit tlike an unlocked Joop to gain access to your computer Hackers are continuously canvassing the Internet and probing ports to find their next victims. Aport probe or port scan) is the use of automated software to locate com- puters that have open ports and are vulnerable to unauthorized access. Software called a port scanner goes to a randomly selected IP address and systematically checks for a response from each port Open ports can then be further tested to gauge their suitability for exploitation You might scoff at your computer's vulnerability to port probes. After all, there are millions and millions of computers on the Internet and a limited number of hackers The chances o ...