?
Solved

Ports

Posted on 2013-05-23
3
Medium Priority
?
317 Views
Last Modified: 2013-06-07
Can someone describe these ports and if they are secure?

2002
4002
6002
0
Comment
Question by:Jack_son_
3 Comments
 
LVL 29

Assisted Solution

by:Jan Springer
Jan Springer earned 664 total points
ID: 39191456
It's not the port that is secure/insecure -- it's the app.

What are the apps?
0
 
LVL 84

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 668 total points
ID: 39191495
'secure' normally means that the communication channel is encrypted.  Web browsers use SSL/TLS in 'https' on port 443 but other ports can be used.  SSH is a different encryption method most commonly used on port 22.  As @_jesper_ said, the applications on both ends have to support the methods for them to work.
0
 
LVL 10

Accepted Solution

by:
tmoore1962 earned 668 total points
ID: 39191596
Ports:
2002 TCP  Secure Access Control Server (ACS) for Windows[citation needed
4002 not specified
6002 not specified

Here is a list of registered ports and their usage:
http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
In short, I will be giving a guide on how to install UNMS on a virtual machine in hyper-v and change the default port for security (you don’t need to have a server, since Windows 10 supports hyper-v)
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

569 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question