Solved

ports used by popular applications

Posted on 2000-03-29
5
191 Views
Last Modified: 2010-04-11
Can you help me get a list of the ports used by applications such as ICQ, Real player and all other internet applications.

And how opening up of these ports can risk the security of an intranet in a company?
0
Comment
Question by:java_lover
  • 3
  • 2
5 Comments
 
LVL 7

Expert Comment

by:jjeff1
ID: 2668868
0
 
LVL 7

Expert Comment

by:jjeff1
ID: 2668870
Oops, the name of the software you want is superscan. It has a huge lists of ports.
0
 

Accepted Solution

by:
cujavia earned 50 total points
ID: 2670093
Start with your computer and open Services file (no extension) in your Windows directory, eg. C:/Windows/Services

A bit more you can find in NT Server Resource Kit (Networking Guide - Appendix B)

Still more, search Internet for RFC (Request For Comments), Services file refers to RFC 1060, but I believe that standard has been updated since.

Hope it helps.
0
 

Expert Comment

by:cujavia
ID: 2670174
Sorry, missed second portion of your question. Concerned about security? obviously your intranet is already connected to the Internet and likely you have some sort of protection implemented. It shouldn't greatly increase the risk if done properly.

0
 

Expert Comment

by:cujavia
ID: 2678793
Check it out, recently came across the following:
http://www.isi.edu/in-notes/iana/assignments/port-numbers
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Suggested Solutions

Lets look at the default installation and configuration of FreeProxy 4.10 REQUIREMENTS 1. FreeProxy 4.10 Application - Can be downloaded here (http://www.handcraftedsoftware.org/index.php?page=download) 2. Ensure that you disable the windows fi…
Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now