Solved

Secure Port 25

Posted on 2003-11-20
8
327 Views
Last Modified: 2010-04-13
How to secure port 25?
0
Comment
Question by:pushkarpathak
  • 4
8 Comments
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 250 total points
ID: 9794832
Dear pushkarpathak,

You can use firewall

Thanks,
Sunray
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9794835
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9794839
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9794841
how to restrict users from gaining access to a Microsoft Windows 2000-based computer through telnet.
http://support.microsoft.com/default.aspx?scid=kb;en-us;250908


Sunray
0
 
LVL 3

Expert Comment

by:UkWizard
ID: 9795718
Think you need to explain what you mean, you can either block port 25, or allow it.

If you have to allow it for incoming email, then you have to actually secure the software thats listening on it.
Because it would be bugs in the software, that could provide a hole into your system. So make sure the email
software is kept up to date.

Regards
UkWizard.
0

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
What is Backup? Backup software creates one or more copies of the data on your digital devices in case your original data is lost or damaged. Different backup solutions protect different kinds of data and different combinations of devices. For e…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now