Data packets
Data packets usually travel to and from numbered network ports linked with specific IP addresses and endpoints, using the TCP or UDP transport layers protocols. All ports are likely at risk of attack. No port is natively secure. The risk comes from the version of the service, whether someone has configured it rightly. There is a total of 65,535 TCP ports and another 65,535 UDP ports, and in this, we will focus on some of the diciest ones. TCP 21 connects FTP servers to the internet. FTP servers carry various vulnerabilities such as anonymous authentication capabilities directory traversals and cross-site scripting, making port 21 an idea target. While some network ports develop suitable entry points for attackers, others make better escape routes. TCP/UDP port 53 for DNS provides an exit strategy. Once criminal hackers within the network have their prize, all they need to do to get it out the door is using readily available software that turns data into DNS traffic.
The more usually utilized a port is, the easier it can be to sneak attacks in with all the other packets, TCP port 80 for HTTP supports the when traffic which web browsers receive. Security across all network ports should include defense-in-depth. Close any ports you don’t utilize, use host-based firewalls on every host, run a network-based next-generation firewall, and monitor ad filter port traffic. In the case of tracking and killing the worm, the following procedure will help. Press control+delete once, click on task manager, click on the processes tab, shutdown all processes with the following names: averse.exe or 4 or 5 digits followed by_up.exe (example12345_up.exe), exist task manager.
Additionally, when running Windows Me or XP, disable the System Restore feature to avoid the computer from restoring the virus while backing up. After that, shutting down the PC and disconnecting internet cables and all other wireless cards. Then restart the computer in safe mode.