home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Chip 2007 January, February, March & April
/
Chip-Cover-CD-2007-02.iso
/
Pakiet bezpieczenstwa
/
Firewalle
/
Ashampoo FireWall 1.1
/
ashampoo_firewall110_sm.exe
/
{app}
/
Translation
/
9.chm
/
cshelp.txt
< prev
next >
Wrap
Text File
|
2006-08-23
|
1KB
|
30 lines
.topic 12060
Network protocols reserving ports. A port is
the entrance to your Computer.The port
number identifies what type of port it is.
For example, port 80 is used for HTTP traffic.
The port numbers are within the range of
0 to 65535
.topic 12070
A Trojan (trojan horse) is a malicious program that
is disguised as or embedded within legitimate software
and may seem to be useful or interesting (or at the very
least harmless) to an unsuspecting user, but are actually
harmful when executed.
.topic 12080
The ôTransmission Control Protocolö (TCP) is used by your
Operating System in order to exchange data with other computers.
The ôInternet Protocolö (IP) is the basis of the Internet.
.topic 12090
The MD5 protection provides the assurance that
a file has not been altered. MD5 is a way to verify
the data integrity.
.topic 12100
UDP (User Datagram Protocol) utilizes ports to
allow application-to-application communication.
.topic 12110
An IP address (Internet Protocol address) is a unique number
that devices use in order to identify and communicate with each
other on a computer network utilizing the Internet Protocol standard (IP).