Yes,
There are even several, go to the following site that lists some of
them :
http://www.rtek2000.com/Tech/InternetSecureLinks.html
Follow the "General Protocols/Services" link
Met vriendelijke groeten - Bien � vous - Kind regards
Guy ROELANDTS
EMEA GS Internet Expertise Centre - CCSA & CCSE
Compaq Software Engineer - Belgium
E-mail : [EMAIL PROTECTED]
Tel: +32(02)729.77.44 (options 3 - 3 - 1)
Fax: +32(02)729.77.65
=====================================================================
This message may contain confidential and/or proprietary information,
and is intended only for the person/entity to whom it was originally
addressed. The content of this message may contain private views and
opinions which do not constitute a formal disclosure or commitment
unless specifically stated. Should you receive this message by mistake
please inform the sender immediately.
=====================================================================
-----Original Message-----
From: Kim Longenbaugh [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, November 20, 2001 2:46 PM
To: [EMAIL PROTECTED]
Subject: [FW-1] list of ports used in exploits/hacks
Is there a listing of ports used in hacks/exploits available? That
would come in pretty handy and might be more useful for anyone trying to
find out if they're being attacked than the regular list of ports.
===============================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
===============================================
===============================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
===============================================