--On Monday, November 12, 2007 20:34:03 +1100 Abuse 007 <[EMAIL PROTECTED]> wrote:
> Kelly, > > Try searching google. > > Read port scanning papers and port scanners documentation. > > Please. > That's what I love about this list. There are so many helpful, caring people here. :-) The OP might want to try these for a basic understanding: <http://nets.rwth-aachen.de/content/teaching/lectures/sub/sikon/sikonSS07/12_ID_4P.pdf> <http://insecure.org/nmap/man/man-port-scanning-techniques.html> -- Paul Schmehl ([EMAIL PROTECTED]) Senior Information Security Analyst The University of Texas at Dallas http://www.utdallas.edu/ir/security/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
