在这篇文章中,我们将简要解释什么是封闭端口和隐形端口以及封闭端口和(Stealth Ports)隐形(Stealth Port)端口之间的区别。毫无疑问,防火墙(Firewalls)是您计算机(网络)中最重要的组件之一,它们可以帮助您保护端口。你知道你需要一个防火墙,这样你的计算机(网络)在互联网(Internet)上对坏人来说是不可见的。这些是坏人,他们找到计算机端口并通过其中一个访问您的计算机。他们的策略不断变化,因此,防火墙设计公司为其防火墙(固件或软件)增加了越来越多的安全性。
封闭端口与隐形端口
长期以来,我一直相信我们所有的 IT 人员都相信将端口保持在隐身模式。然而,一位用户回复了我对Comodo防火墙的评论,称他的ISP(提供的 Internet 服务(Internet Service Provided))已经对网络进行了编程,将端口显示为“关闭”,而不是首选的“隐身”。我不知道这如何使防火墙后面的计算机或计算机网络更安全。在我看来,封闭的端口仍然很容易受到攻击,因为坏人总能想出如何使用多种技术打开它们。只需收听流量,使用开放端口访问计算机,然后打开封闭端口。
如果您不知道封闭端口模式(closed port mode)和隐身端口模式(stealth port mode)之间的区别,这里是一个简单的描述。
一台计算机有许多端口,通过这些端口与连接到它的不同组件进行通信,例如打印机、扫描仪、键盘和路由器等。连接到打印机和其他外围设备的端口是可以的,只要它们不构成“互联网(Internet)事物” ”——意思是他们没有连接到互联网(Internet)。但是,如果这些计算机或外围设备中的任何一台连接到Internet,我们必须确保没有人可以在未经适当许可的情况下访问它们。这将整个事情总结为“一切都通过一个或多个端口连接到互联网”。(Internet)
例如,端口号 995 用于接收安全电子邮件。端口#110 也用于通过未加密的(Port)Internet连接接收邮件。同样(Likewise),在大多数基于 Windows 的计算机中,端口号 80 用于连接到Internet 。
黑客所做的是尝试找到任何端口实例——打开或关闭,以便他们可以访问任何计算机(网络)或服务器。如果端口打开,他们可以直接进入计算机(网络)。如果端口关闭,他们仍然可以使用组合技术进入计算机(网络)。但是,如果端口处于隐身模式,则Internet上的其他人看不到它。一个隐形案例让你的电脑(网络)从互联网上(Internet)消失。
在我看来,防止您的计算机网络端口出现在Internet上的防火墙是最好的。因此,您应该选择为端口提供隐身模式而不是关闭的防火墙。我不知道为什么一些ISP使用封闭模式,正如我对(ISPs)Comodo防火墙的评论所告诉我的那样。如果有人有答案,请与我分享。
软件防火墙
请(Please)注意,此免费防火墙列表可能并不完美。我选择了十几个防火墙并运行了一些Internet上可用的测试。它们是任何人都可以轻松获得的基本测试,并且都通过了它们。根据我的观察,这些是适用于 Windows 10 的最佳免费防火墙软件。(best Free Firewall software for Windows 10)看看它们,如果你觉得我错过了或包含了不应该在这里的东西,请告诉我 - 有原因。
硬件防火墙
与往常一样,固件防火墙位于顶部,并出现在与Internet的第一个接触点。硬件(Hardware)防火墙是包含在您的路由器和调制解调器中的防火墙,可帮助您在Internet上保持隐身。虽然他们提供的默认模式是隐身模式,但您可以使用下面提到的测试之一来查看结果。如果您想测试硬件防火墙,请在运行测试之前禁用任何其他防火墙(包括Windows防火墙)。(Windows)您可以在此处阅读有关硬件防火墙与软件防火墙(Hardware firewall vs. Software firewall)的更多信息。
虽然我完全相信这些是最好的保护形式,因为您可以打开这些防火墙,然后使用软件防火墙添加另一层,但我现在敦促您测试硬件防火墙,以防您的ISP也将它们配置为显示为关闭而不是隐身模式。
你有什么意见?(What is your opinion?)您使用哪种防火墙,您认为哪种防火墙最好?如果您认为我遗漏了某些内容或包含了不应该出现的内容,请告诉我。
参考: (Reference: ) GRC,屏蔽测试:Gibson Research Corp
Join the discussion on the Best Free Antivirus for Windows too!
Closed Port vs Stealth Port - Difference discussed
Іn this post, we wіll explain what are Cloѕеd Ports and Stealth Ports and the differences between a Closed Port and a Stealth Port in brief. Firewalls, no doubt, are one of the most important components of your computer (network) and they helр you protect Рorts. You know you need a firewall so that your computer (network) is not visible on the Internet to the bad guys. These are bad guys who find computer ports and access your computer through оne of them. Their tactics kеep on сhanging and hence, the firewall designing companies add more and more secυrity tо their firewalls – firmware or software.
Closed Port vs Stealth Port
For long, I’ve believed all of us IT’ians believe in keeping the ports in stealth mode. However, a user responded to my review of the Comodo firewall saying his ISP (Internet Service Provided) has programmed the network in a way that shows ports as “closed” as against the preferred “stealth”. I do not know how that makes the computer or the computer network behind that firewall any safer. In my opinion, closed ports are still vulnerable as the bad guys can always figure out how to open them using a combination of techniques. Just listen to traffic, get to the computer using the open port and then open the closed ports.
In case you do not know the difference between closed port mode and stealth port mode, here is a simple description.
A computer has many ports through which it communicates with different components attached to it such as printers, scanners, keyboards, and routers, etc. The ports connected to printers and other peripherals are okay as long as they do not form “things of the Internet” – meaning they are not connected to the Internet. But if any of those computers or the peripherals are connected to the Internet, we have to make sure no one can access them without proper permission. That sums up the entire thing to “everything connects to the Internet through one or more port”.
For example, port number 995 is used to receive secure email. Port #110 is also used to receive mail via an unencrypted connection to the Internet. Likewise, port number 80 is used to connect to the Internet in most Windows-based computers.
What hackers do is to try and find any instances of ports – open or closed so that they can gain access to any computer (network) or server. If the port is open, they can straightaway get into the computer (network). If the port is closed, they can still use a combination of techniques to get into the computer (network). However, if the port is in stealth mode, it is invisible to others on the Internet. A stealth case makes your computer (network) disappear from the Internet.
In my opinion, the firewalls that prevent ports of your computer networks from appearing on the Internet are the best. Thus, you should go for firewalls that provide stealth mode for ports rather than closed. I do not know why some of the ISPs are using closed modes as told to me by way of comment on my review of the Comodo firewall. If any of you have an answer, please share it with me.
Software Firewalls
Please note that this list of free firewalls may not be perfect. I selected a little over a dozen firewalls and ran few tests available on the Internet. They were basic tests that are easily available to anyone and all passed them. These are the best Free Firewall software for Windows 10 as per my observation. Check them out and if you feel I missed or included something that shouldn’t be here, please inform me – with reasons.
Hardware Firewalls
As always, the firmware firewalls are on top and are present at the very first point of contact with the Internet. Hardware firewalls are ones included in your routers and modems that help you stay invisible on the Internet. While the default mode they provide is a stealth mode, you can use one of the tests mentioned below to see the results. In case you wish to test the hardware firewall, please disable any other firewall (including the Windows firewall) before running the tests. You can read more here on Hardware firewall vs. Software firewall.
While I was totally convinced that these are the best form of protection as you can have these firewall turned on and then use a software firewall to add another layer, I now urge you to test the hardware firewall just in case your ISP too configured them to appear as closed instead of stealth mode.
What is your opinion? Which firewall do you use and which do you think is the best one? If you think I missed something or included something that shouldn’t be here, please let me know me.
Reference: GRC, Shields Up Tests: Gibson Research Corp
Join the discussion on the Best Free Antivirus for Windows too!