Solved

Secure Port 25

Posted on 2003-11-20
8
335 Views
Last Modified: 2010-04-13
How to secure port 25?
0
Comment
Question by:pushkarpathak
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
8 Comments
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 250 total points
ID: 9794832
Dear pushkarpathak,

You can use firewall

Thanks,
Sunray
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9794835
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9794839
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9794841
how to restrict users from gaining access to a Microsoft Windows 2000-based computer through telnet.
http://support.microsoft.com/default.aspx?scid=kb;en-us;250908


Sunray
0
 
LVL 3

Expert Comment

by:UkWizard
ID: 9795718
Think you need to explain what you mean, you can either block port 25, or allow it.

If you have to allow it for incoming email, then you have to actually secure the software thats listening on it.
Because it would be bugs in the software, that could provide a hole into your system. So make sure the email
software is kept up to date.

Regards
UkWizard.
0

Featured Post

The Ultimate Checklist to Optimize Your Website

Websites are getting bigger and complicated by the day. Video, images, custom fonts are all great for showcasing your product/service. But the price to pay in terms of reduced page load times and ultimately, decreased sales, can lead to some difficult decisions about what to cut.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question