Chapter 19. Securing Ports and Protocols
How Ports and Protocols Allow Access to Your Computer 628
Determining Which Ports Are Active 632
Restricting Access to Ports 638
Why Blocking Ports Isn't Enough 650
Shutting Down Unneeded Services 650
Tightening Security on Internet Information Services 662
Controlling network access is an important part of system security. On the Internet, where the flow of data is based on Transmission Control Protocol/Internet Protocol (TCP/IP), that means controlling access to ports. By monitoring and limiting the types of connections that applications and computers make to your system, you can greatly reduce the chances that the system will be compromised.
In this chapter, we first explain how ports and protocols work. We ...
Get Microsoft® Windows® XP Networking and Security Inside Out: Also Covers Windows 2000 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.