User talk:Jusjase

Welcome!

Hello,, and welcome to Wikipedia! I hope you like the place and decide to stay. Unfortunately, one or more of the pages you created may not conform to some of Wikipedia's guidelines for page creation, and may soon be deleted.

There's a page about creating articles you may want to read called Your first article. If you are stuck, and looking for help, please come to the New contributors' help page, where experienced Wikipedians can answer any queries you have! Or, you can just type   on this page, and someone will show up shortly to answer your questions. Here are a few other good links for newcomers: I hope you enjoy editing here and being a Wikipedian! Please sign your name on talk pages using four tildes ( ~ ); this will automatically produce your name and the date. If you have any questions, check out Where to ask a question or ask me on. Again, welcome! –Darkmaster2004 talk 15:04, 13 May 2009 (UTC)
 * Your first article
 * Biographies of living persons
 * How to write a great article
 * The five pillars of Wikipedia
 * Help pages
 * Tutorial

FIN Scan
FIN scan a port scanning technique that hackers use to see which ports on your computer are penetrable by knocking on the port like a door. It works by sending a FIN packet to a target port then the target system sends a [RST] for all closed ports. FIN scan can identify all closed doors and then give you a list of all open ports. Most system do not realize this is happening because its handle by the lowest level of the operating system.

FIN scan is used mainly on UNIX systems. this type of scan can get through any basic firewall or router that flter incoming [TCP] packets. They are also used to terminate connections. With FIN scan if no service is listening to the port the system will generate an error message but if a service is listening the system will quietly drop the incoming packet, silence show that the port is open.

References

Exposed 5th Edition: Network Security Secrets & Solutions (pg 53)





FIN Scan
FIN scan a port scanning technique that hackers use to see which ports on your computer are penetrable by knocking on the port like a door. It works by sending a FIN packet to a target port then the target system sends a [RST] for all closed ports. FIN scan can identify all closed doors and then give you a list of all open ports. Most system do not realize this is happening because its handle by the lowest level of the operating system.

FIN scan is used mainly on UNIX systems. this type of scan can get through any basic firewall or router that flter incoming [TCP] packets. They are also used to terminate connections. With FIN scan if no service is listening to the port the system will generate an error message but if a service is listening the system will quietly drop the incoming packet, silence show that the port is open.

References

Exposed 5th Edition: Network Security Secrets & Solutions (pg 53)