Ports explained!

Hi folks, have not posted lately was busy with some personal commitments, today we would talk about networking ports.

In computer networking, a port number is part of the addressing information used to identify the senders and receivers of messages. Some of the home network routers and computer software work with ports and sometimes allow you to configure port number settings. These port numbers allow different applications on the same computer to share network resources simultaneously. Port numbers are mainly used with TCP/IP connections.

In technical terms: In computer networking a port is an application-specific or process-specific software construct serving as a communications endpoint in a computer’s host operating system. A port is associated with an IP address of the host, as well as the type of protocol used for communication.

A port number is a 16-bit unsigned integer, thus ranging from 0 to 65535. A process associates its input or output channels via Internet sockets, a type of file descriptors, with a transport protocol, a port number and an IP address. This process is known as binding, and enables sending and receiving data via the network.

The port numbers are encoded in the transport protocol packet header, and they can be readily interpreted not only by the sending and receiving computers, but also by other components of the networking infrastructure. In particular, firewalls are commonly configured to differentiate between packets based on their source or destination port numbers.

The practice of attempting to connect to a range of ports in sequence on a single computer is commonly known as port scanning. This is usually associated either with malicious cracking attempts or with network administrators looking for possible vulnerabilities to help prevent such attacks.

How it works

Port numbers work like telephone extensions. Just as a business telephone switchboard can use a main phone number and assign each employee an extension number (like x100, x101, etc.), so a computer has a main address(IP Address) and a set of port numbers to handle incoming and outgoing connections.

Uses in URL’s

Port numbers can occasionally be seen in the Uniform Resource Locator (URL) of a website or other services. By default, HTTP uses port 80 and HTTPS uses port 443, but a URL like http://www.example.com:8000/path/ specifies that the web site is served by the HTTP server on port 8000.

Commonly used ports

20 & 21: File Transfer Protocol (FTP)

22: Secure Shell (SSH)

23: Telnet remote login service

25: Simple Mail Transfer Protocol (SMTP)

53: Domain Name System (DNS) service

80: Hypertext Transfer Protocol (HTTP) used in the World Wide Web

110: Post Office Protocol (POP3)

119: Network News Transfer Protocol (NNTP)

143: Internet Message Access Protocol (IMAP)

161: Simple Network Management Protocol (SNMP)

443: HTTP Secure (HTTPS)

Hackproof your google account!

Google has introduced 2-step verification which enhances the security in a great way, with 2 step verification , login is done in two steps a user sign’s in with username and password and in second step a verification code is sent to user’s mobile through sms/phone call , after the entering the verification code the user is logged in.

Why use of 2 step verification

                    It protects your account from unauthorized access.  If your password is cracked, guessed  or hacked by someone after that he/she cannot access your account without verification code. One who have that verification code that person can sign in in your account. That means only owner of that account can access that account.

Requirements

1. You have to register  your  mobile number  with your gmail account.

2.  If you  are using an Android, BlackBerry, or iPhone, these devices use the Google Authenticate mobile app to generate the verification code.

3. 2-step verification is only available in US English in the next-generation version of the Google Apps administrator control panel.

How to enable it? 

  1. First go to your control panel (Google Account Setting)Google Account Settings

 

 

 

 

 

 

 

 

2. Under personal setting click use 2-step verification.

 

3. Then select how you want to receive your verification code.( text message or phone call)

4. Next time you sign in your account after you entered your password  hit on the sign in button.  Then it prompts the verification code window.

5.  If suppose you lost your mobile then you can sign in with your backup codes.  Which you have to set when you enable your 2 step verification.

Signing in to mobile devices with application specific password

Once your users enroll in 2-step verification, they may need to use application specific password in addition to their verification codes. For installed applications that don’t have a 2-step verification field, your users will need to enter an application-specific password once per device or application in place of their regular password to access their Google Account.
Common devices and applications that require application-specific passwords are: Gmail and Google Calendar on Android-based phones, ActiveSync for Windows Mobile and iPhone, and IMAP clients such as Thunderbird.

Hello World

Hi Folks,

Welcome to Sec-Hack-Re-d Blog!

Over the  years  that I have been programming  I have noticed  that people very rarely care for computer security-which should be our priority because for all the exciting things we are able to do with computers: organizing our lives, staying in touch with people, etc.

People don’t want to hire the expertise to monitor their network security, and will gladly farm it out to a company that can do it for them. They think security can be something that can be purchased, but they purchase the results, not details. IT security is getting harder day by day — increasing complexity is largely to blame — and the need for security products isn’t disappearing anytime soon.

Knowing the details is necessary, than buying only results, as Henry Ford has stated:

“The only real security that a man can have in this world is a reserve of knowledge, experience and ability.”

I’ll be using this space to talk about information/network security, measures against hacking, reverse engineering and also some random trends in security. So keep an eye out, this will be a lot of fun and exciting learning!

Blog Stats

  • 114 hits
May 2017
M T W T F S S
« Mar    
1234567
891011121314
15161718192021
22232425262728
293031  

Enter your email address to follow this blog and receive notifications of new posts by email.

May 2017
M T W T F S S
« Mar    
1234567
891011121314
15161718192021
22232425262728
293031