Port Detection Sites and Downloads:

Downloads.com (Won't Connect)

Free Download Center.com (Won't Connect)

Linux-Sec.net

SoftPanorama.org

Scan.Sygatetech.com

PcFlank.com

What Each Term Means:

"Open" indicates that your computer is actively listening and ready to accept incoming connection to that specific port. The presence of an open port is like having an open door to your house, and if that port is password protected then there is a guard at that "door". Guards can be tricked in to letting attackers inside.


"Closed" indicates that there is nothing listening at a specific port, so even if an attacker connects to your computer there will not be any server waiting there to allow the connection. This is analogous to shutting the door to your house, and locking it to the outside. No one can get in, but anyone can open the door (port) from the inside. This means that a program on your computer could simply open a "closed" port with no restrictions from the operating system.

"Blocked" ports are not only closed, but they are completely hidden (stealthed) to the world. This would be like shutting and locking your door, and then painting over it so no one can tell there is a door there. In general, not even programs on your computer can open the door if it is properly blocked.

Trojan Scan will test various known trojan ports for the existence of a listening, active Trojan. To see which ports we are currently testing, click here.

Stealth Scan uses various stealth methods to reach computers shielded by firewalls and Intrusion Detection systems.

Quick Scan performs a quick and accurate portscan of your computer.

ICMP Scan (coming soon) will scan your computer for ping replies and various other ICMP types. We will also test your class C subnet for vulnerability to Broadcast Ping (smurf) attacks.

Full TCP Scan tests all ports below 1024. We are currently working on a complete TCP scan which will scan all 65535 ports.

Full UDP Scan (coming soon) will scan for open UDP ports. These are seldom used for legitimate services, and are often used by trojans and denial of service (DOS) attacks.

Site hosted by Angelfire.com: Build your free website today!