There are several ways to check ports on your computer. An open port that is not used by system processes or the local network can be the reason for the penetration of dangerous software into the system, access to your computer from the outside.
Instructions
Step 1
First of all, such a situation should be prevented by protection systems: antivirus and firewall. If you do not have them installed, then you need to install and check the system. Moreover, it is advisable to install an effective and optimal means of protection (for example, Kaspersky Internet Security). But if such software has not been used before, then, perhaps, a malicious, open port has been actively used by dangerous applications for a long time.
Step 2
The easiest way is to view the presence of such a port with the help of a simple text, which can be conducted online at the link: https://2ip.ru/port-scaner/. If, during the analysis of your computer, an open port is found (potentially dangerous for the system), the program will show it in red. If such a port is found during the test, write down its name separately, as it urgently needs to be closed
Step 3
You can close such a port using many programs. But the simplest is Windows Worms Doors Cleaner, which is only 50 kb in size and does not require installation (you can download it at: https://2ip.ru/download/wwdc.exe). After downloading it, all you have to do is start and close the malicious port, which was given by the analysis of the computer after the check. Then you need to restart your computer. However, this is more of a haste, so to speak, because over time the port may be reopened. Therefore, it is advisable to install a firewall (for example, Outpost Firewall) and save the existing position after closing the dangerous port
Step 4
It will also not hurt to check your computer using the free AVZ utility (you can download it from the link: https://www.z-oleg.com/secur/avz). During a quick test, it is necessary to identify errors in the system settings, possibly knocked down using the same port. For example, if allowed "anonymous user" it should be disabled and restart the computer.