Chapter 19. Securing Ports and Protocols

How Ports and Protocols Allow Access to Your Computer 628

Determining Which Ports Are Active 632

Restricting Access to Ports 638

Why Blocking Ports Isn't Enough 650

Shutting Down Unneeded Services 650

Tightening Security on Internet Information Services 662

Controlling network access is an important part of system security. On the Internet, where the flow of data is based on Transmission Control Protocol/Internet Protocol (TCP/IP), that means controlling access to ports. By monitoring and limiting the types of connections that applications and computers make to your system, you can greatly reduce the chances that the system will be compromised.

In this chapter, we first explain how ports and protocols work. We ...

Get Microsoft® Windows® XP Networking and Security Inside Out: Also Covers Windows 2000 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.