Current location - Quotes Website - Team slogan - Port number registry
Port number registry
80=/hard/03/8/26909.shtml)

Detailed closing method of 135 port:

Mand), and then cd.

C:\winnt\system32 (your system installation directory), enter r_server.exe /stop.

Then enter and type r_server /uninstall /silence into C:\winnt\system32.

(System Directory) Delete R _ server.exe, admdll.dll and radbrv.dll.

(10) Enjoy * * * treatment by default:

Many people simply don't know that there is a default * * * to enjoy this kind of thing. In fact, once the system is installed, the default * * * enjoyment is on. The default enjoyment of C and D is c$, d$ and D $. In fact, this is quite dangerous. This is equivalent to letting the black class in with the door open. There are many ways to invade. Ipc$ is the most famous one. So it must be closed. There are many ways to turn it off.

Port Description: This is to automatically enjoy the system installation partition when installing the server, although it is access.

You also need the password of superuser, but from the security test of the server, this is a potential security risk.

Worried, it is best to turn off this "default * * * enjoyment" to ensure system security.

How to turn it off: There are many ways to turn off the default enjoyment. I'll summarize it here according to what I know.

Four most commonly used methods are introduced.

Delete * * * enjoyment under 1 disc operating system (DOS)

Click "Start/Run" and enter "cmd" (98 is the command) in the run window to open the cmd command line. Use the net share command to see if the default * * * enjoyment and ipc$ are set. All * * * enjoyment information can be displayed in it. Select the * * * enjoyment you want to delete. Share xx/Delete on the Internet (where xx means the * * * enjoyment file you want to delete). For example, net share c$/Delete is to delete the default * * * enjoyment of disk C. (According to my experience, net share c:\/Delete is actually the same as deleting the default * of disk C..

2. Drive letter properties

Determine the drive letter to delete, right-click and select * * * Sharing and Security Options. In the pop-up window, choose not to * * * share the folder. Then click OK. Therefore, * * * sharing (including the default * * * sharing) is turned off.

3. Delete in the control panel

Control Panel-Administrative Tools-Computer Management-* * Enjoy Folders-* * *

Turn off the default * * * enjoyment (including deleting admin$).

4. Modify the registry

Click "Start/Run", enter "Regedit" in the run window, open the registry editor, expand "HKEY _ Local _ Machine \ System \ Current Control Set \ Lanman Workstation \ Parameters", create a double-byte value named "AutoShareWks" in the right window, and set its value to 0, (Win2000 Professional Edition WinXP [HKEY]

Lanman server \ parameters] autoshareserver = dword: 00000000 (win 2000 server, win2003 server) so that "default * * * enjoyment" can be completely turned off.

The above ports are the most frequently invaded ports and the most suitable computers for ordinary users. As for the ports opened by other specific software, we can shield them according to the method of creating IP security policy. Increase the regular shielding port of firewall; Close the port by filtering the port through TCP/IP filtering of local connection. The following introduces the method of shielding ports by creating IP security policy, because the rules of firewall are added to shield ports; The method of filtering ports through TCP/IP filtering of local connection and the method of creating IP security policy to filter ports. So I won't go into details. Here's how to create an IP security policy to block ports.

2. Create an IP security policy to shield ports:

Closed ports are: 135, 137, 138,139,445,1025,2475,3127,6/kloc.

The specific operation is as follows:

By default, Windows has many open ports. When you surf the Internet, network viruses and hackers can connect to your computer through these ports. In order to turn your system into an iron wall, you should close these ports, mainly TCP 135,139,445,593, 1025 and UDP 135, 137,/kloc-0. The following describes how to close these network ports under WinXP/2000/2003:

Step 1: Click Start Menu/Settings/Control Panel/Management Tools, double-click to open the local security policy, select the IP security policy on the local computer, right-click the blank position in the right pane to pop up the shortcut menu, and select Create IP security policy (as shown in the right figure), and a wizard will pop up. Click Next in the wizard to name the new security policy; Press Next again, and the Secure Communication Request screen will be displayed. Remove the check mark to the left of "Activate default mapping rule" on the screen, and then click "Finish" to create a new IP security policy.

Step 2: Right-click the IP security policy, in the Properties dialog box, uncheck the "Use the Add Wizard" to the left, and then click the "Add" button to add a new rule.

Then the "New Rule Attribute" dialog box will pop up, and click "Add" on the screen to pop up the IP filter list window; In the list, put "Use the Add Wizard" first.

Remove the hook on the left, and then click the Add button on the right to add a new filter.

Step 3, enter the Filter Properties dialog box. The first thing you see is the address. Select "any IP address" as the source address and "My IP address" as the destination address.

Click the "Protocol" tab, select "TCP" in the "Select Protocol Type" drop-down list, then enter "135" in the text box under "To this port" and click.

Click the "OK" button (as shown on the left), thus adding a filter to block the TCP 135(RPC) port, which can prevent the outside world from connecting to your computer through the 135 port.

Click OK and return to the Filter List dialog box. You can see that a policy has been added. Repeat the above steps and continue to add TCP 137, 139, 445 and 593.

Port and UDP 135, 139, 445 ports, and establish corresponding filters for them.

Repeat the above steps, add the shielding policies of TCP ports 1025, 2745, 3 127, 6 129 and 3389, establish the filters of the above ports, and finally click OK.

Step 4: In the "New Rule Properties" dialog box, select "New IP Filter List", and then click the circle on its left to add a dot, indicating that it has been activated.

Finally, click the Filter Actions tab. In the Filter Actions tab, uncheck Use the Add Wizard, click the Add button, and then add.

Block operation (right): In the Security Measures tab of the new filter operation properties, select Block, and then click OK.

Step 5: Enter the "New Rule Attribute" dialog box and click "New Filter Action". A dot will be added in the circle on the left to indicate that it has been activated. Click Close to close the dialog box; Finally, return to the "New IP Security Policy Properties" dialog box, check the "New IP Filter List" on the left, and then press "OK" to close the dialog box.

In the Local Security Policy window, right-click the newly added IP security policy and select Assign.

So after the restart, the above-mentioned network ports in the computer are closed, and viruses and hackers again.

You can't connect these ports to protect your computer.

My suggestion: If the port you want to close is a common intrusion port, I suggest that you use the system shutdown method. This is more direct and effective. For universal ports, if you don't want to open them, you can use ip security policy or firewall or TCP\IP filtering to close them. When you want to open this port or software in the future, just remove the rules. Here's another reminder. The ports of 1024 to 65535 are all opened by applications (including Trojan horses and viruses, of course). It is not recommended to close this port unless you are sure that it is a Trojan horse or virus or a useless port. Otherwise, there will be many problems.

The following is the basic knowledge of computer ports.

Ports can be divided into three categories:

1) well-known ports: from 0 to 1023, which are closely bound with some services. Usually, the communication of these ports clearly indicates the protocol of a certain service. For example, port 80 has always been HTTP communication.

2) Registration port: from 1024 to 49 15 1. They are loosely bound to some services. In other words, many services are bound to these ports, and these ports are also used for many other purposes. For example, many systems handle a dynamic port of about 1024.

3) Dynamic and/or dedicated ports: from 49 152 to 65535. Theoretically, these ports should not be assigned to services. In fact, machines usually allocate dynamic ports from 1024. But there are exceptions: SUN's RPC port starts at 32768.