Original address: http://www.moon-soft.com/download/info/2826.htm
Port: 0Service: ReservedDescription: Typically used to analyze the operating system. This method works because in some systems "0" is an invalid end, you will have different results
TCP/UDP Common port number
7 Echo (PING)9 DiscardDaytimer19 Word Fuzhou Builder20/TCP FTP Data21/TCP FTP Control File Transfer Protocol22/TCP SSH Secure Login, File transfer (SCP), and port redirection23/tcp Telnet Unsafe Text transfer25/tcp SMTP
2. Telnet protocolThe Telnet protocol is a member of the TCP/IP protocol family and is the standard protocol and main way of Internet remote Login service. It provides users with the ability to perform remote host work on the local computer. Use a
Port number---The identification number of the application software that has network functionality. Note that the port number is not fixed, that is, it can be manually assigned by the user (and, of course, is generally defined when the software is
The general content is as follows:
Local port forward -- create a port locally and use SSH for forwarding
Ssh-l 8888: localhost: 8888 username @ codemonkey1
This command is executed on the client machine.
We need to access port 8888 of
1024 The following is reserved for the system, and from 1024-65535 is used by the userFor personal writing applications, try not to use a port number between 0 and 1024.1024 to 65535 we can program with. This is not a Linux rule, it is the socket
Speaking of secure network access, we believe that the first thing we think of is secure shell, which is usually abbreviated as SSH. This is because SSH is easy to install, easy to use, and common. Generally, UNIX, Linux, and FreeBSD systems all
For example, the domain name is free of charge when registering a peanut shell, because it is in the internal network, so the intranet version is used, set the intranet host, after Port ING, save, the Internet access address is automatically
How to Do SSH tunneling (port forwarding)
In this post we will see how SSH works ?, What is SSH tunneling? What is important of SSH tunnels and how to setup the SSH tunnel.When SSH server is installed in machine then by default its allowed SSH
Port 445 intrusion detailsAbout port 445 intrusionPort 445 intrusion detailsSearch for more information about port 445 intrusion on this site
Port 445 intrusion. Before that, we should first look at port 445 as the intrusion port. Why?Port 445 is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.