?
Solved

Secure Port 25

Posted on 2003-11-20
8
Medium Priority
?
337 Views
Last Modified: 2010-04-13
How to secure port 25?
0
Comment
Question by:pushkarpathak
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
8 Comments
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 1000 total points
ID: 9794832
Dear pushkarpathak,

You can use firewall

Thanks,
Sunray
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9794835
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9794839
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9794841
how to restrict users from gaining access to a Microsoft Windows 2000-based computer through telnet.
http://support.microsoft.com/default.aspx?scid=kb;en-us;250908


Sunray
0
 
LVL 3

Expert Comment

by:UkWizard
ID: 9795718
Think you need to explain what you mean, you can either block port 25, or allow it.

If you have to allow it for incoming email, then you have to actually secure the software thats listening on it.
Because it would be bugs in the software, that could provide a hole into your system. So make sure the email
software is kept up to date.

Regards
UkWizard.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question