Is it true that a port can be closed? [closed] - networking

It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center.
Closed 11 years ago.
I heard someone saying that a "port should be opened" , said a person inside a closed room in our company. So I wonder that it is possible to close a port ! So is it true that a port can be closed and/or opened ? If so how to close it , and how to open it ?

Depending on you operating system, the firewall can be configured to block traffic on selected ports.
For example, on Windows 7, you can do this by opening the firewall advanced settings and creating a new rule for incoming/outgoing traffic.

I think the ports he is talking about is operating system related ports but not hardware related. Operating systems ports lie unused until a certain number, in which OS uses lot of ports for its internal functions. But sometime when a user wants to run a software like server and access it, he has to do it through one of the port. However hardware ports also can be thought as opened and closed, unless you connect it with a cable. Be it a mouse or anything, otherwise ports are opened, if cable is unused.

Related

How does TCP work on an actual system [closed]

It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center.
Closed 9 years ago.
I know all the details about tcp and udp and how they provide transport level support for applications but what I am interested in is how tcp/udp is actually implemented in a host system. Is it via a number of system/function calls or is it a daemon process running which continually takes data from its buffers and encapsulates before writing to device driver buffer?
It's a pretty broad question and it's going to depend what system you're using and what facility the applications are using.
But in general, unix/windows use sockets to communicate using tcp. You send/receive data using a socket by doing system calls (there are a few different ones). So it's implemented in the kernel not through a userspace daemon on these systems.
It is a module that runs in kernel space as part of a networking protocol stack. Applications communicate with it via system calls, e.g. Socket(), connect(), accept(), recv(), send().

Application suited for a TCP environment but are intended to operate in a UDP world? [closed]

It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center.
Closed 10 years ago.
Everything these days has to operate in a TCP-friendly environment. Even in area and applications that use UDP, we still see some TCP tendancies.
Is anyone aware of any applets or applications that are well-suited for a TCP environment but are intended to operate in a UDP world?
Well the need for TCP or UDP depends on the requirement of the applet or application.
If we look into benefits of TCP
High Reliability (Connection Oriented)
Low Level Error Handling and Packet Resending
Ordered (Sequential Transmission of Bytes)
And UDP is complete opposite of this.
For your question Peer to Peer File Sharing Applications like (Bear Share, Lime etc), since there are transferring files should ideally be running on TCP because of the above reasons. But they run in UDP because of the following reasons.
A File will not be downloaded from one peer but from multiple peers chunk by chunk (From multiple seeds)
A Connection can not be created and maintained because Peers may be turned off (Shutdown or Internet Disconnect) without knowledge.
So it is up to the requirement of the application

How to decrypt https [closed]

It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center.
Closed 11 years ago.
How can i decrypt https with a network sniffer like wireshark or fiddler, without having administrative access to the server? For example if i log onto gmail, how can i set up wireshark from my computer to read all the http headers over the tls? I see tutorials online for decrypting https with wireshark, but they all say i need access to the private key of the server, and I assume this means that it is impossible to decrypt anything like the example i mentioned, gmail, is this correct or not?
To justify the s of https we agreed not to be able to decrypt network traffic.
Fiddler will do this from your pc if you turn on the decrypt https option. You can only do this for your traffic not others.
http://www.fiddler2.com/Fiddler/help/httpsdecryption.asp
It is true that in the general case, you cannot do this.
The only way to do this without the server key would be to launch a man-in-the-middle attack, such as with a tool like sslsniff or a proxy server with a known key. If needed, you could even create your own CA and instruct your browser to trust it, and issue your own private key+cert for what you wanted to sniff; then you could sniff your own traffic to the target.
In principle, you reasonably cannot do that, since it is the very purpose of HTTPS to ensure privacy of the connection.

Operating Systems,Unix [closed]

It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center.
Closed 11 years ago.
The process is in either user mode or kernel mode based on this fact i want to ask that how process in user mode can map virtual address to physical address when it has no access to uarea.
A user-mode process isn't supposed to know about physical addresses. That's the whole point of virtual memory.
EDIT:
It seems you're asking how a userspace program knows where to put it's data. It doesn't. It pretends it has the whole address space (0-4GB on x86) and the Operating System does whatever address translation is necessary to let the process pretend that.

accessing a servlet through a computer that is connected through switch [closed]

It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center.
Closed 11 years ago.
I am new to servlet.I made a servlet on a computer in a LAN connected network when I am accessing that servlet from another computer which is connected to the first thru a switch it is not able to access that I am specifying the IP address of that computer in the url is it possible to do that or I am wrong somewhere please help
thnx in advance!!!!!!!!
Make sure that the proper port is open.
Also what OS?
What type of servlet?
what are you using to deploy it?
Is there a firewall?
Did you try to ping the ip address?

Resources