Solved

ports used by popular applications

Posted on 2000-03-29
5
202 Views
Last Modified: 2010-04-11
Can you help me get a list of the ports used by applications such as ICQ, Real player and all other internet applications.

And how opening up of these ports can risk the security of an intranet in a company?
0
Comment
Question by:java_lover
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 7

Expert Comment

by:jjeff1
ID: 2668868
0
 
LVL 7

Expert Comment

by:jjeff1
ID: 2668870
Oops, the name of the software you want is superscan. It has a huge lists of ports.
0
 

Accepted Solution

by:
cujavia earned 50 total points
ID: 2670093
Start with your computer and open Services file (no extension) in your Windows directory, eg. C:/Windows/Services

A bit more you can find in NT Server Resource Kit (Networking Guide - Appendix B)

Still more, search Internet for RFC (Request For Comments), Services file refers to RFC 1060, but I believe that standard has been updated since.

Hope it helps.
0
 

Expert Comment

by:cujavia
ID: 2670174
Sorry, missed second portion of your question. Concerned about security? obviously your intranet is already connected to the Internet and likely you have some sort of protection implemented. It shouldn't greatly increase the risk if done properly.

0
 

Expert Comment

by:cujavia
ID: 2678793
Check it out, recently came across the following:
http://www.isi.edu/in-notes/iana/assignments/port-numbers
0

Featured Post

 Watch the Recording: Learning MySQL 5.7

MySQL 5.7 has a lot of new features. If you've dabbled with an older version of MySQL, it is definitely worth learning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Make the most of your online learning experience.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses
Course of the Month7 days, 5 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question