Linux Port Scan


Linux Port Scan

The process of scanning ports, like Linux Port Scan or Window Port Scan, on a PC or a server is often used by System Admins and cyber criminals/hackers. Both of which are looking for open and available ports – the malicious ones searching for “fingerprint services”. On Linux, a port scan can be conducted for…

Read More

Everything You Need To Know About Port Scan Attack


Port Scan Attack

Port scan attack is one of the oldest methods used by hackers and cyber criminals. It is still widely used to test access to networks and subsequently servers and computers. Port scan attack is not as popular today as it was in the nineties but there are automated tools that can scan a large number…

Read More

Port Security Overview


port security

When comes to online security there may not be anything more important than creating a “locked down” network that outsiders and attackers cannot breach just by detecting the network in the first place. Unfortunately, even though we depend on the internet and connected networks today more than any time in human history far too many…

Read More

What You NEED to Know About IP Scanners


IP Scanners

If you are serious about cybersecurity today you absolutely must know everything there is no about IP scanners and how hackers and cyber criminals use port scanning as reconnaissance to get “under the skin” of online systems in an effort to find exploits they can use to break in. On the surface, a port scanner…

Read More

Ping monitoring tool


Ping monitoring

Ping is a network command that is primarily used to determine if a local host can exchange (send and receive) data with another host. Based on the information returned, it can be inferred that the TCP/IP parameters are set correctly and are functioning properly. Under normal circumstances, Ping will return several parameters with a loss…

Read More

Security Orchestration 101


The threat of cyber security and cyber attacks has never been as high as it is right now does security orchestration is the solution. Security OrchestrationOur modern world is incredibly dependent on the internet and online connectivity in a way that wasn’t even possible previously. All of us have internet-enabled devices in our pockets, in…

Read More

4 Easy methods for how to check if port is open on Windows


In this how to check if port article, we will try to answer all the how to questions we receive on our website. We will add new question from time to time base on new how to questions that users will ask. For general question, we will try to answer it for the Windows operation…

Read More

What is a ssl port? and what port ssl use?


What is a ssl port? An SSL port is a secure protocol that in default use port 443 for communication. SSL is a secure socket layer and is widely used on the internet for HTTPS communication. SSL or secure socket layer is a secure protocol that use to secure the communication on port 443 (as…

Read More

How to do a continuous ping under windows


If you are asking yourself how to do a continuous ping you are in the right place, follow this article for 2 easy to use methods that you can use to run a continuous ping command. How to do a continuous ping: OK, Like the title said, here are 2 easy to use tools or…

Read More

Windows File Hash Tool


We, on the open port website, build a new tool that you can use, a file hash tool, It calls FileHasher it can give you several hash signatures about a selected file, include MD5, SHA1, SHA256, CRC32, file entropy and more. we build it for some test that we had to do with hash signature, and now…

Read More

← OLDER POSTS NEWER POSTS →