.topic 12060 Network protocols reserving ports. A port is the entrance to your Computer.The port number identifies what type of port it is. For example, port 80 is used for HTTP traffic. The port numbers are within the range of 0 to 65535 .topic 12070 A Trojan (trojan horse) is a malicious program that is disguised as or embedded within legitimate software and may seem to be useful or interesting (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. .topic 12080 The “Transmission Control Protocol” (TCP) is used by your Operating System in order to exchange data with other computers. The “Internet Protocol” (IP) is the basis of the Internet. .topic 12090 The MD5 protection provides the assurance that a file has not been altered. MD5 is a way to verify the data integrity. .topic 12100 UDP (User Datagram Protocol) utilizes ports to allow application-to-application communication. .topic 12110 An IP address (Internet Protocol address) is a unique number that devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP).