Solved

What are all the application ports

Posted on 2001-08-22
3
162 Views
Last Modified: 2013-11-16
Does anyone know of a good website/resource that keeps a record of all application and the ports (tcp/udp) they use for configuring a firewall?
applications like icq etc etc etc
thanks
0
Comment
Question by:glenramsey
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
geoffryn earned 100 total points
ID: 6413636
I am fond of snort at http://snort.sourcefire.com/ports.html, but a search for icq turned up nothing.  Other interesting site are:

http://www.chebucto.ns.ca/~rakerman/port-table.html

http://www.sockets.com/services.htm
0
 

Author Comment

by:glenramsey
ID: 6413707
thanks geoffryn i managed to find a superb little text-based app called FPort.
run it and you see every open port that is in use and the app using it.
obviously that's on the current machine
for the moment this is for use on a server i am using with ZoneAlarm so it's ideal.
thanks for the links.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
Make the most of your online learning experience.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question