A computer port is a system resource allocated by the operating system to a networked application. Ports cannot be created, since the OS does this automatically, but you can open, close them, monitor what programs work with them.
Instructions
Step 1
Port control in the Windows operating system is a prerequisite for safe networking. To check them, connect to the Internet, then type netstat –aon at the command line and press Enter. You will see a list of current network connections with internal and external ip-addresses, used ports, connection status and process ID numbers.
Step 2
Start your internet browser and type netstat –aon again at the command line. Compare the new table with the previous one - you will see that after starting the browser, new lines appear. In particular, new ports were opened, they are indicated in the "Local address" column after the colon in the address lines. These ports opened the operating system services and the running browser. The last column of the table contains the process identifiers - PIDs. With their help, you can find out which program is opening a particular port.
Step 3
Type tasklist command in the same command line window. You will see a list of running processes. The first column - "Image name" - contains the names of the running processes. The second contains process IDs. Look in the previous table for the PID of the process that opened the new port and find that ID in the process table. To the left of it, in the first column, you will see the name of the process you are interested in. If you want to know more about it, enter it into the search engine, you will receive all the necessary information.
Step 4
Does a hacker have the ability to connect to your computer through open ports? Yes, if the programs and services "hanging" on these ports have vulnerabilities. Regularly updating programs and OS files helps prevent unauthorized access to your computer.
Step 5
Be sure to use a firewall (firewall, firewall) to control ports. Many Trojans, having got on a computer and collecting the necessary information, try to open a port and send the information to the hacker. The firewall will notice the opened port and immediately block the connection, giving you a message.