Detailed explanation of each port Karma, 21, 80, 3389, 6000, 7000, 8000, 8080

Updated on technology 2024-03-18
18 answers
  1. Anonymous users2024-02-06

    The video screen has passed, so let's take a look at it with a brief introduction.

  2. Anonymous users2024-02-05

    You can use some software to optimize your computer, such as antivirus software, to manage your computer with software, and to be safe.

  3. Anonymous users2024-02-04

    Haha, the landlord is too exaggerated, rubbing the net is now on the edge of the law, and if you don't break the law, there is no police to arrest you!

    If you go to someone else's wireless network, of course others can see your IP address, but it doesn't work if you see it, he can't find out who it is, because your IP address is based on his wireless number, and you can change your own IP address

    All can be on, don't worry about this aspect of the problem, but it is always inconvenient to use other people's networks, and others can turn off when they want to stop when they want

  4. Anonymous users2024-02-03

    Yes, you can find out, and people with a little computer experience will know about it, but I won't tell you about it here, so as not to be taken advantage of by others. As for the police! In China, there is no place where they can't go, and there is no person they can't find, by the way, even if there is no special legislation for rubbing the Internet, but in essence, this is embezzlement of other people's property, and using other people's networks without their consent is stealing.

  5. Anonymous users2024-02-02

    You won't know the exact address.

    If the owner of the Internet is found to be on the Internet, the MAC address of the Internet terminal (the physical address of the network card) may be recorded, and then added to the blacklist.

  6. Anonymous users2024-02-01

    As long as you close some ports of your computer, you can rest assured that especially 3389 80 8000 8080 these ports, the Internet police want to know your address, he must remotely enter your computer... If you don't enter this time, you are a god, he can see you, but he can't find you...

    But don't worry, the current police won't do it, or you're messing around, generally surfing the Internet, who cares about you.

  7. Anonymous users2024-01-31

    I won't know, the civilian-level ones have not advanced to this extent, and those criminal investigation methods, even if he calls the police, the police will not accept them

  8. Anonymous users2024-01-30

    I can't be sure, unless he has the police's equipment to detect the source of the model, which is not something that ordinary people will have, so don't worry...

  9. Anonymous users2024-01-29

    It's not as serious as catching someone, unless you cross the moral line.

  10. Anonymous users2024-01-28

    would know if he was a bit of an IQ person.

  11. Anonymous users2024-01-27

    If you're afraid of finding out, don't rub it, and what if he calls hackers to hack your computer.

  12. Anonymous users2024-01-26

    Take a look**,I hope it can help you,The ports of the previous Trojans may not be reused by the new Trojans now.,Only the ports that come with the system.,There will always be a lot of inexplicable connections.。

    I use win 7, and these rules are configured just after installing the system.

  13. Anonymous users2024-01-25

    White Hat Hacking Tips: How to Close Dangerous Ports with Firewall Rules and IP Security Policies?!

  14. Anonymous users2024-01-24

    If you're referring to an IP address, the easiest way to do this is to go up and open it and your IP address will be displayed.

  15. Anonymous users2024-01-23

    A lot of ports are good, you should mean to say how many network ports are opened by the service of the machine and the port view manager.

    View the ports in use in the machine] Chinese Simplified Green Free Edition.

  16. Anonymous users2024-01-22

    I don't know what network port you want to see, is it the port of the switch where you surf the Internet, if it is that, you can't see it, you need to configure the line, the username and password of the switch, etc., remote login does not need to configure the line but you need to know the IP address.

  17. Anonymous users2024-01-21

    When setting up the server, you need to fill in the port, this port number is free to fill in on the server side, generally greater than 1024, less than 65535. When the client uses this server to surf the Internet, the port number must be the same as the port number set by itself on the server.

    tomcat

    Used by default.

    port, you can change it yourself.

    The port number of the server-side software can generally be customized, as long as it is between 1024 and 65535

    In between, just don't repeat it. Each software has a different way of setting the port number. It's usually in the Settings screen.

    If the client software wants to set the port number, it must be the same as the server software.

  18. Anonymous users2024-01-20

    In the Windows command prompt, type: netstat -na to see all the local and public ports you are currently connected to. I don't know how to search for it myself.

Related questions
6 answers2024-03-18

For banking business, it should be https web page, not only the problem of opening port 443 in the firewall, you can refer to the following methods for https not to open: (note that it is an XP system). >>>More

11 answers2024-03-18

I am from Liuzhou, and I have also been to Wuhan to study at university, so I should have more say. >>>More

3 answers2024-03-18

First, the basic interpretation of the word Jin:

2. Saliva; Khan: Fluid. All over the body. >>>More

9 answers2024-03-18

People are grouped according to their conduct and hobbies, and thus can distinguish themselves from each other. It means that good people always make friends with good people, and bad people always get together with bad people. >>>More

5 answers2024-03-18

The eight stages of Erikson's personality development are as follows: >>>More