Pete,

While you can get a list ( via google etc.) of what ports are used for which
specific activities,
the reported uses are 'normally used for' rather than 'are only used for'
and most definitely not 'can only be used for'.

What you need is a good firewall - one that monitors and allows you to
control both in, and out usage
as well as reporting session initiation.

And - use one or more of the online facilities for checking your systems
vulnerability

JimB.


----- Original Message ----- 
From: "Pete Holsberg" <[EMAIL PROTECTED]>
To: <[email protected]>
Sent: Monday, July 04, 2005 5:22 PM
Subject: Ports Used Normally?


> If I execute
>
> netstat -an
>
> I see a long long list of stuff. How can I tell if any of
> the ports shown are being used for nefarious purposes?
>
> Thanks.
>
> ---
> Pete Holsberg
> Columbus, NJ
> ---
> "...that there must be no criticism of the president...is
> not only unpatriotic and servile, but is morally
> treasonable..."
>
> Theodore Roosevelt
>
> --
>
>

--

Reply via email to