Ask:
127.0.0.1 is the loopback address is mainly used for network software testing and local machine interprocess communication, no matter what program, once using the loopback address to send data, the protocol software immediately return, do not carry out any network transmission.
1. What does this local 127.0.0.1:1194 and external 127.0.0.1:8800 mean?
2. What does the local address 0.0.0.0:135 and the external address 0.0.0.0:0 mean?
3. Some of the software needs the Internet Explorer Proxy Server set to 127.0.0.1:8800 what does it mean?
For:
First of all, the test results from your figure are obtained by nbtstat command, nbtstat is used to detect native TCP/UDP connection, 127.0.0.0:xxxx, and the following x represents the port number, Any program calls require port number, native program access to external programs, is a native IP address + Port-to-Destination IP address + port number process, the following answer your question:
1,. This local 127.0.0.1:1194 with the external What does 127.0.0.1:8800 mean?
--Represents the native open port number 1194 and 8800, and the program in which they are communicating. (The following will tell you if you look at the programs that occupy these ports)
2, local address 0.0.0.0:135 and external address 0.0.0.0:0 mean?
--The native 135 port is a shared port, the destination port is 0, port 0 is reserved port, meaningless, can be commonly understood as native, here can be interpreted as, you have a shared directory of the machine.
(if it is an XP system, the system has a default hidden shared directory). You can view the sharing of this machine through the command net share, if there is a $ symbol for hidden shares, such as C $, which means that the whole drive is shared, just can't see directly, is hidden.
3. What do you mean by setting the proxy server for Internet Explorer to 127.0.0.1:8800?
--You are not also in the local set up proxy 8800, you figure in 127.0.0.0:1194-127.0.0.1:8800 represents the native 1194 program (ie, probably), and 8800 is located in the program (proxy port), access. IE set proxy 8800, which means that the native Internet Explorer is accessed via port number 8800.
======================
If you use Netstat-ano, home parameters ano, you will get more useful information, including PID information, in the task management can be the first corresponding PID number, so as to find the correct port to call the program. Take a look at my article below and I'm sure you'll understand. Http://hi.baidu.com/chenzhihan/blog/item/a7fbb582c7f893ba6c8119ae.html
Cross-examine:
Well, your answer is very detailed, thank you!!!
There is a problem not quite understand, not to say 127.0.0.1 is the loopback address, how can be used to do proxy server address it? I use the software called ADK Web Purifier, it automatically bar IE browser proxy server set to 127.0.0.1:8800, why the proxy server set to 127.0.0.1 to play the role of web filtering
Chase Answer:
1, not that 127.0.0.1 is a loopback address? --Is the loopback address, can be commonly understood as representative of the local machine.
2, how can be used to do proxy server address? --just said 127.0.0.1 for this machine, you say the ADK this program to provide proxy services, then you are the proxy server, and the designated port is 8800, and IE or QQ, such as to take advantage of ADK provide proxy service services to access the external network, you must 127.0.0.0:1194 (IE) -->127.0.0.0:8800, such a conversion, all the programs that want to access the external network must communicate with port 8800 for communication access.
I don't know, ask again.
Ask:
(5). You said ADK This program to provide proxy services, IE or QQ, such as the use of ADK to provide proxy services to access the external network, you must 127.0.0.0:1194 (IE)-->127.0.0.0:8800, such a transformation, Why the above also has the PID is 1492 ADK 192.168.1.3:3054 220.181.112.152:80 do not know this is not the software internal mechanism, not good answer will not need to answer
Chase Answer:
1, 192.168.1.3:3054 220.181.112.152:80 do not know this is not the internal mechanism of software, ...
--I don't know if your IP is 192.168.1.3, if yes, it means 3054 port, PID1492 program is accessing 220.181.112.152 server, and the other port is 80, we know that 80 port is the Web port, which is the Web service, which can be understood as your ADK in accessing each other's 80 port, can even judge. 3 IP, open the webpage.
Of course this is the basic judgment, not absolute.
2. ipc$ is the default share for partitions. Microsoft is designed with administrator maintenance in mind. Baidu will have a lot of information. You say with Netstat-ano See 135 port, first command the same parameters, there will be different results, second you want to see this parameter down there are 445 ports, you know the role of the 445 port Baidu a bit. --"445 port is a mixed port, he and 139 port together is the main channel of ipc$ intrusion. With it we can easily access a variety of "shared" folders or shared printers in the LAN, but it is because of it, hackers have the opportunity, they can secretly share your hard drive through the port, and even silently will be the format of your hard drive out! All we can do is find a way to keep hackers out of the way, blocking 445-port vulnerabilities. 】
3, 0.0.0.0:445 "*:*", you can interpret this symbol as a local, that is, there is no target access address, the machine open 445 port, the program PID is 4.
4. The question you asked (3), I answered-yes, I can understand that.
5, PID 0, in Windows many systems have, you do not go to drill this niu Jiao jian, you just know this is the system built-in, in addition, the system by default, there are many processes are in constant listening state, will not regularly send packets to the Internet, or external access. That's why Microsoft silently uses the Internet of Things to determine which systems are pirated and give a "black screen".
In short WINODWS system is a tool, but many of the core of things, the domestic so-called experts have not fully understand, people develop things, there must be a back door you can not touch, even if you need to touch the time, unless you do not. Of course, your research spirit is very valuable, but technology must not be a dead-going.
From:http://zhidao.baidu.com/link?url= Eird0m31pniazf2ybjxxjtav0ka7cr1mwwoxvmu5ho2btiwy64yqqzw5twfk7geetvzlyeciugzvsomomvffna
Go to doubts about 127.0.0.1 addresses