We use transport-layer protocols to communicate to specific services on a remote device. In this video, you’ll learn about some of the most popular TCP and UDP ports used on our servers.
The knowledge of our application ports and protocols is important for network security and management. In this video, you’ll learn about the popular application ports and protocols on your network.
There’s more than one way to send a file across the network. In this video, you’ll learn which file transfer technologies can be used to send in-the-clear and encrypted information.
What FTP account is commonly used as an unverified user?
The FTP bounce attack is an example of how a legitimate application can be used for other purposes. In this video, you’ll learn how this legacy attack type works and how it was used to manipulate systems.
Our specialized application protocols make it very easy for us to surf the net, transfer files, and send our email messages. In this video, you’ll learn about common application protocols used by HTTP, IMAP, and VoIP applications.
If you’re looking through pages of protocol decodes or log files, you’ll need a working knowledge of the most popular network port numbers. In this video, you’ll learn about port numbers and you’ll learn the value of the most common port numbers.
A misconfigured application can cause connectivity problems, even when the network is operating perfectly. In this video, you’ll learn about the settings for SMTP, IMAP and POP mail protocols, FTP clients, and browser proxy settings.
The TCP and UDP protocols use ports to associate application communication between devices. In this video, you’ll get an overview of ports and you’ll learn which ports are most commonly found on the network.