[2001-02-26] Your Site: Hackers Welcome Here?
In our last issue, we discussed some of the basics for securing a machine on a network. The tactics that were mentioned are great for a first line of defense and will prevent a majority of attacks. In this issue, we will look a little closer at some of the most common TCP/IP ports that are used, the services that are generally run on these ports and what this means to you.


Send me relevant info on
products and services.