Welcome to Bucaro TecHelp!

Bucaro TecHelp
Maintain Your Computer and Use it More Effectively
to Design a Web Site and Make Money on the Web

About Bucaro TecHelp About BTH User Agreement User Agreement Privacy Policy Privacy Site Map Site Map Contact Bucaro TecHelp Contact RSS News Feeds News Feeds

Each year 1.5 million shelter animals are euthanized (670,000 dogs and 860,000 cats). Source: ASPCA. The solution is not to shelter unwanted pets, but to SHUT DOWN THE PET MILLS. Anyone who wants a pet will just have to adapt a great pet from a shelter.

NMAP (Network Mapper) Port Scanner

When hackers attempt to gain unauthorized access to a computer or server on the Internet, one of the first things they do is look for open ports. One method of searching for open ports is TCP SYN scanning, but this can be tedious. NMAP is a free and open source port scanner that hackers can use to automate the process of finding open ports to attack.

NMAP's command-line interface

NMAP uses IP packets in a nonstandard way to scan for computers and servers on the Internet and search for open ports, services available at those ports, and other information that can be used to hack the system. NMAP is available for the Windows, Linux, and Mac operating systems.

Zenmap's GUI interface

NMAP has a command-line interface but utilities with GUI's are available that work with NMAP, such as the Zenmap results viewer.

PortSentry is a Cisco security tool that monitors for both TCP as well as UDP scans and can detect stealth scans such as those produced by NMAP. PortSentry can be configured to listen on ports and detect scan attempts and can automatically firewall the scanner's IP address.

NMAP is promoted as a "Security Scanner", and since it's free and open source, it could indeed be used for security auditing by scanning your own network to see what ports are available to hackers.

More Network Security Articles:
• Network Security
• Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
• How to Secure Your Wireless Network
• How to Become a Professional Ethical Hacker
• Elementary Information Security
• What is Network AAA (Authentication, Authorization, and Accounting)?
• Network Security by Filtering
• Wireless Network Security - The Basics of Securing a Wireless LAN
• How to Protect Your Business From a Cyber Attack
• How a Firewall Provides Network Security

RSS Feed RSS Feed

Follow Stephen Bucaro Follow @Stephen Bucaro

Computer Networking Sections

Fire HD
[Site User Agreement] [Privacy Policy] [Site map] [Search This Site] [Contact Form]
Copyright©2001-2018 Bucaro TecHelp 13771 N Fountain Hills Blvd Suite 114-248 Fountain Hills, AZ 85268