Thursday, June 22, 2006

Ports commonly used by Trojans

Ports used by Trojans

Understanding a Port?

In the TCP/IP protocol stack, messages associated with the common application protocols that most of us are familiar with — such as HTTP for the Web; SMTP, POP, and IMAP for e-mail; Telnet and SSH for remote logon; and FTP for file transfers — operate over the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP); TCP and UDP messages, in turn, are carried inside Internet Protocol (IP) packets. The primary difference between TCP and UDP is that TCP is connection-oriented and UDP is connectionless. When using TCP, then, two hosts must first establish a logical connection before they can exchange data (analogous to establishing a telephone connection) while hosts using UDP do not require a logical connection before the exchange of information (analogous to sending a letter through the postal service).

Both TCP and UDP employ port numbers to identify the higher layer applications at the hosts that are communicating with each other. End-to-end data communications on the Internet, in fact, are uniquely identified by the source and destination host IP addresses and the source and destination TCP/UDP port numbers.

TCP/IP applications generally employ a client/server model, exemplified by the relationship between your Web client software (i.e., the browser) and a Web server; the user "points" their browser at the Web server which is usually listening on port 80. Port numbers can take on a value between 1 and 65535, with server applications generally being assigned a value below 1024.

Are you aware that many of these ports are used by Trojans?
If you were not, you would want to know which ones are most commonly used by Trojans..
You can find listing of some common trojan ports here.


Tuesday, June 20, 2006

Best Internet explorer based Browsers

Best Internet Explorer based Browsers

Best IE based Browsers

Do you know you can get more out of internet explorer without leaving it?

There are some very good browsers based on internet explorer core that enhance internet explorer such greatly that it'll completely transform your websurfing experience. Some of them are Avant browser, Maxthon, Crazy browser.

The best news is they are all free. You will get greater customization, greater security, faster surfing experience and lots and lots of excellent features that you ever dreamed internet explorer had.

So, Which one is best among them?
If you're looking for a great browsing experience with tons of innovating features, go for Maxthon browser. It has everything you'll ever need!


Friday, June 16, 2006

PC security tips | Computer security tips

Although, there can be innumerable tips and tricks to make your pc secure and work at its optimum potential. But, not all suit to an average user. There are some common pc security precautions an average user can adopt pretty fast to make its internet-connected pc secure. These tips assume that the user pc has microsoft Windows OS running.
Microsoft windows has bugs and security holes. Every new patch released fixes some bugs in previous installations. You can tighten the security of windows in these easy steps.
  • Upgrade to the Latest service pack for your windows. Regularly install patches. Don't forget to install critical updates.
  • If your are using a stand-along computer to access internet, turn off file and printer sharing.
  • Install your windows Xp on NTFS partition if you do not want to use other operating system. NTFS partition is comparatively secure than FAT32.
  • Disable Guest your account in your windows. Create security policies for each and every user. Create separate user accounts with security policies enforced for each user.


Thursday, June 15, 2006

Test your Pc Security

Testing is important when it comes to PC Internet security. There are several ways to test your system. Some are offline methods while others require you to connect to internet. Did you know you can test your computer with best online testing services and protect yourself from dangerous internet threats. These tests basically test your computer system using various parameters and tell you where there is a security loophole.