Current location - Quotes Website - Team slogan - Port? Serial port?
Port? Serial port?
Classification: Computer/Network >> Internet

Analysis:

Computer "port" is the literal translation of English port, which can be regarded as the exit of computer communication with the outside world. Among them, the ports in the hardware field are also called interfaces, such as USB ports and serial ports. Ports in the software field generally refer to communication protocol ports in the network for connected services and connectionless services. They are abstract software structures, including some data structures and I/O buffers.

According to the port number can be divided into three categories:

(1) Well-known ports: from 0 to 1023, which are closely bound with some services. Usually, the communication of these ports clearly indicates the protocol of a certain service. For example, port 80 has always been HTTP communication.

(2) Registration port: from 1024 to 49 15 1. They are loosely bound to some services. In other words, many services are bound to these ports, and these ports are also used for many other purposes. For example, many systems handle a dynamic port of about 1024.

(3) Dynamic and/or dedicated ports: from 49 152 to 65535. Theoretically, these ports should not be assigned to services. In fact, machines usually allocate dynamic ports from 1024. But there are exceptions: SUN's RPC port starts at 32768.

Some ports are often used by hackers and Trojan viruses to attack computer systems. The following is the introduction of computer ports and the brief methods to prevent being attacked by hackers.

World Wide Web publishing service

Port description: Port 8080, like port 80, is used for WWW proxy service, which can realize web browsing. When visiting a website or using a proxy server, the port number ":8080" is often added, such as cce:8080.

Port vulnerability: Port 8080 can be used by various virus programs. For example, the BrOwn Hole (Bro) Trojan virus can completely remotely control an infected computer using port 8080. In addition, RemoConChubo and RingZero trojans can also use this port to attack.

Operation suggestion: Generally, we use port 80 for web browsing. In order to avoid virus attacks, we can close this port.

Port: 2 1

Service: FTP

Description: FTP server opens ports for uploading and downloading. The most common attacker is to find a way to open anonymous's FTP server. These servers have read-write directories. Trojan Doly Trojan, Fore, Stealth FTP, WebEx, WinCrash and blade runner open ports.

Port: 22

Service: Ssh

Description: The connection between TCP established by PcAnywhere and this port may be to find ssh. This service has many weaknesses. If configured in a specific mode, many versions that use the RSAREF library will have many loopholes.

Port: 23

Service: telephone

Description: Remote login, the intruder is searching for the service of remote login UNIX. In most cases, scanning this port is to find the operating system running on the machine. And using other technologies, intruders will also find the password. Trojan miniature telephone server opens this port.

Port: 25

Service: SMTP

Description: The port opened by SMTP server is used to send mail. Intruders are looking for SMTP servers to send their spam. The intruder's account is closed, and they need to connect to a high-bandwidth email server and send simple information to different addresses. Trojan horse antigen, e-mail password sender, Haebu Coceda, Shtrilitz Stealth, WinPC and WinSpy all open this port.

Port: 80

Service: HTTP

Description: used for web browsing. The Trojan Executor opened the port.

Port: 102

Service: Message Transfer Agent (MTA)-x.400 over TCP/IP.

Description: Message Transfer Agent.

Port: 109

Service: post office protocol-Version 3

Description: The POP3 server opens this port to receive mail, and the client accesses the mail service on the server side. POP3 services have many recognized weaknesses. There are at least 20 weaknesses about user name and password exchange buffer overflow, which means that intruders can enter the system before actually logging in. There are other buffer overflow errors after successful login.

Port: 1 10

Service: all ports of SUN's RPC service.

Description: Common RPC services include rpc.mountd, NFS, rpc.statd, rpc.c *** d, rpc.ttybd, amd, etc.

Port: 1 19

Service: Neork news transmission protocol

Description: news newsgroup transport protocol, which carries USENET communication. The connection of this port is usually when people are looking for a USENET server. Most ISPs only allow their customers to access their newsgroup servers. Opening the newsgroup server will allow anyone to post/read, access restricted newsgroup servers, post anonymously or send spam.

Port: 135

Services: Location Services

Description: Microsoft runs DCE RPC endpoint mapper on this port as its DCOM service. This is similar to the function of UNIX11port. Services using DCOM and RPC register their locations with the endpoint mapper on the computer. When remote customers connect to their computers, they will look for the location where the endpoint mapper finds the service. Will a hacker scan this port of a computer to find the Exchange Server running on this computer? What version? There are also some DOS attacks on this port.

Ports: 137, 138, 139

Service: NETBIOS name service

Note: Among them, 137 and 138 are UDP ports, which are used when transmitting files through network neighbors. And port 139: the connection coming through this port attempts to obtain NetBIOS/SMB service. This protocol is used for windows file and printer sharing and SAMBA. WINS Regisrtation also uses it.

Port: 16 1

Service: SNMP

Description: SNMP allows remote management of devices. All configuration and operation information is stored in the database and can be obtained through SNMP. Many administrators' misconfiguration will be exposed. Cackers will try to access the system using the default passwords public and private. They will try all possible combinations. SNMP packets may be misdirected to the user's network.

e800/articles/386/ 1098085325309

Where there are serial ports and parallel ports on the computer, there should be: hard disk, motherboard, printer. Serial ports are generally used to connect some special external devices. Such as communication equipment. Parallel ports are usually used to connect printing devices. The serial port is relatively small, and there are prominent needles exposed. Parallel port is generally larger than serial port, generally red, with two rows of holes.

A serial port is described as one channel, while a parallel port has eight channels.

It can transmit 8 bits (one byte) data at the same time.

But the speed of parallel port is not fast, because 8-bit channels interfere with each other. Transmission is limited by speed. Moreover, when transmission errors occur, 8-bit data should be retransmitted at the same time. The serial port has no interference. Just resend one bit after transmission error. So fast is faster than parallel port. This is the importance people attach to the serial hard disk.

Serial port and parallel port are different ports for connecting peripherals. These two ports are different in shape, transmission speed and equipment that can be connected.

Serial transmission is bit by bit, just like a string of beads.

Parallel ports can transmit data concurrently and transmit multiple bits at the same time.

Now there is a serial hard disk SATA interface, which is also the same reason. The reason why it can transmit at the speed of 150MB/s is that the parallel signals can't solve the interference between them well at a relatively high frequency, so now the parallel hard disk of ATA 13 MB/s has reached the limit and is replaced by STAT. There are also 80 ATA 100 parallel hard disk data lines, 40 of which are ground wires to prevent interference between parallel signals.

The nominal bit/s of STAT speed is actually the speed of 150M/300M.

At present, the fastest single hard disk speed is less than100MB/s/s.

The common speed is 40-60MB/s,

Remember! ! ! Interfaces are not bottlenecks.