List of TCP and UDP Port Numbers

Total Page:16

File Type:pdf, Size:1020Kb

List of TCP and UDP Port Numbers List of TCP and UDP port numbers From Wikipedia, the free encyclopedia Jump to: navigation, search In computer networking, the protocols of the Transport Layer of the Internet Protocol Suite, most notably the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP), but also other protocols, use a numerical identifier for the data structures of the endpoints for host-to-host communications. Such an endpoint is known as a port and the identifier is the port number. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1] Contents • [hide]1 Table legend • 2 Well- known ports: 0–1023 • 3 Registe red ports: 1024– 49151 • 4 Dynami c and/or private ports: 49152– 65535 • 5 See also • 6 Referen ces • 7 Externa l links [edit] Table legend Color coding of table entries Official Port/application combination is registered with IANA Unofficial Port/application combination is not registered with IANA Conflict Port is in use for multiple applications [edit] Well-known ports: 0–1023 Port Description Status 0/TCP,U Reserved Official DP 1/TCP,U TCP Port Service Multiplexer Official DP 2/TCP,U Management Utility Official DP 3/TCP,U Compression Process Official DP 5/TCP,U Remote Job Entry Official DP 7/TCP,U Echo Official DP 9/TCP,U Discard Official DP 11/TCP, Active Users Official UDP 13/TCP, DAYTIME - (RFC 867) Official UDP 17/TCP, Quote of the Day Official UDP 18/TCP, Message Send Protocol Official UDP 19/TCP, Character Generator Official UDP 20/TCP FTP - data Official 21/TCP FTP—control (command) Official 22/TCP, Secure Shell (SSH)—used for secure logins, file transfers (scp, sftp) and port Official UDP forwarding 23/TCP Telnet protocol—unencrypted text communications Official Simple Mail Transfer Protocol (SMTP)—used for e-mail routing between mail 25/TCP Official servers 35/TCP, Any private printer server protocol Official UDP 35/TCP, QMS Magicolor 2 printer server protocol Unofficial UDP 37/TCP, TIME protocol Official UDP 39/TCP, Resource Location Protocol[2] (RLP)—used for determining the location of Official UDP higher level services from hosts on a network 41/TCP, Graphics Official UDP 42/TCP, nameserver, ARPA Host Name Server Protocol Official UDP 42/TCP, WINS Unofficial UDP 43/TCP WHOIS protocol Official 49/TCP, TACACS Login Host protocol Official UDP 52/TCP, XNS (Xerox Network Services) Time Protocol Official UDP 53/TCP, Domain Name System (DNS) Official UDP 54/TCP, XNS (Xerox Network Services) Clearinghouse Official UDP 55/TCP, ISI-GL (ISI Graphics Language) Unofficial UDP 56/TCP, XNS (Xerox Network Services) Authentication Official UDP 56/TCP, RAP (Route Access Protocol)[3] Unofficial UDP 57/TCP MTP, Mail Transfer Protocol Unofficial 58/TCP, XNS (Xerox Network Services) Mail Official UDP Bootstrap Protocol (BOOTP) Server; also used by Dynamic Host Configuration 67/UDP Official Protocol (DHCP) Bootstrap Protocol (BOOTP) Client; also used by Dynamic Host Configuration 68/UDP Official Protocol (DHCP) 69/UDP Trivial File Transfer Protocol (TFTP) Official 70/TCP Gopher protocol Official 79/TCP Finger protocol Official 80/TCP, Hypertext Transfer Protocol (HTTP) Official UDP 81/TCP Torpark—Onion routing Unofficial 82/UDP Torpark—Control Unofficial 83/TCP MIT ML Device Official 88/TCP, Kerberos—authentication system Official UDP 90/TCP, dnsix (DoD Network Security for Information Exchange) Securit Attribute Token Official UDP Map 90/TCP, Pointcast Unofficial UDP 101/TC NIC host name Official P 102/TC ISO-TSAP (Transport Service Access Point) Class 0 protocol[4] Official P 104/TCP ACR/NEMA Digital Imaging and Communications in Medicine Official ,UDP 107/TC Remote TELNET Service[5] protocol Official P 109/TC Post Office Protocol 2 (POP2) Official P 110/TCP Post Office Protocol 3 (POP3) Official 111/TCP Sun Remote Procedure Call Official ,UDP 113/UD ident—user identification system, used by IRC servers to identify users Official P 113/TCP Authentication Service (auth) Official ,UDP 115/TCP Simple File Transfer Protocol (SFTP) Official 117/TCP UUCP Path Service Official 118/TCP SQL (Structured Query Language) Services Official ,UDP Network News Transfer Protocol (NNTP)—used for retrieving newsgroup 119/TCP Official messages 123/UD Network Time Protocol (NTP)—used for time synchronization Official P 135/TCP DCE endpoint resolution Official ,UDP Microsoft EPMAP (End Point Mapper), also known as DCE/RPC Locator 135/TCP service[6], used to remotely manage services including DHCP server, DNS server Unofficial ,UDP and WINS 137/TCP NetBIOS NetBIOS Name Service Official ,UDP 138/TCP NetBIOS NetBIOS Datagram Service Official ,UDP 139/TCP NetBIOS NetBIOS Session Service Official ,UDP 143/TCP Internet Message Access Protocol (IMAP)—used for retrieving, organizing, and Official ,UDP synchronizing e-mail messages 152/TCP Background File Transfer Program (BFTP)[7] Official ,UDP 153/TCP SGMP, Simple Gateway Monitoring Protocol Official ,UDP 156/TCP SQL Service Official ,UDP 158/TCP DMSP, Distributed Mail Service Protocol Unofficial ,UDP 161/TCP Simple Network Management Protocol (SNMP) Official ,UDP 162/TCP Simple Network Management Protocol Trap (SNMPTRAP)[8] Official ,UDP 170/TC Print-srv, Network PostScript Official P 177/TCP X Display Manager Control Protocol (XDMCP) Official ,UDP 179/TC BGP (Border Gateway Protocol) Official P 194/TCP IRC (Internet Relay Chat) Official ,UDP 199/TCP SMUX, SNMP Unix Multiplexer Official ,UDP 201/TCP AppleTalk Routing Maintenance Official ,UDP 209/TCP The Quick Mail Transfer Protocol Official ,UDP 213/TCP IPX Official ,UDP 218/TCP MPP, Message Posting Protocol Official ,UDP 220/TCP IMAP, Interactive Mail Access Protocol, version 3 Official ,UDP 259/TCP ESRO, Efficient Short Remote Operations Official ,UDP 264/TCP BGMP, Border Gateway Multicast Protocol Official ,UDP 311/TCP Mac OS X Server Admin (officially AppleShare IP Web administration) Official 308/TC Novastor Online Backup Official P 318/TCP PKIX TSP, Time Stamp Protocol Official ,UDP 323/TCP IMMP, Internet Message Mapping Protocol Unofficial ,UDP 350/TCP MATIP-Type A, Mapping of Airline Traffic over Internet Protocol Official ,UDP 351/TCP MATIP-Type B, Mapping of Airline Traffic over Internet Protocol Official ,UDP 366/TCP ODMR, On-Demand Mail Relay Official ,UDP 369/TCP Rpc2portmap Official ,UDP 370/TCP codaauth2 - Coda authentication server Unofficial ,UDP 370/TCP securecast1 - Outgoing packets to NAI's servers, Unofficial ,UDP http://www.nai.com/asp_set/anti_virus/alerts/faq.as 371/TCP ClearCase albd Official ,UDP 383/TCP HP data alarm manager Official ,UDP 384/TCP A Remote Network Server System Official ,UDP 387/TCP AURP, AppleTalk Update-based Routing Protocol Official ,UDP 389/TCP Lightweight Directory Access Protocol (LDAP) Official ,UDP 401/TCP UPS Uninterruptible Power Supply Official ,UDP 402/TC Altiris, Altiris Deployment Client Unofficial P 411/TCP Direct Connect Hub Unofficial 412/TC Direct Connect Client-to-Client Unofficial P 427/TCP Service Location Protocol (SLP) Official ,UDP 443/TCP Hypertext Transfer Protocol over TLS/SSL (HTTPS) Official ,UDP 444/TCP SNPP, Simple Network Paging Protocol (RFC 1568) Official ,UDP 445/TC Microsoft-DS Active Directory, Windows shares Official P 445/UD Microsoft-DS SMB file sharing Official P 464/TCP Kerberos Change/Set password Official ,UDP 465/TC Cisco protocol Unofficial P 465/TC SMTP over SSL Unofficial P 475/TC tcpnethaspsrv (Hasp services, TCP/IP version) Official P 497/TC Dantz Retrospect Official P 500/UD Internet Security Association and Key Management Protocol (ISAKMP) Official P 501/TC STMF, Simple Transportation Management Framework - DOT NTCIP 1101 Unofficial P 502/TCP Modbus, Protocol Unofficial ,UDP 504/TCP Citadel - multiservice protocol for dedicated clients for the Citadel groupware Official ,UDP system 510/TC First Class Protocol Unofficial P 512/TC Rexec, Remote Process Execution Official P 512/UD comsat, together with biff Official P 513/TC Login Official P 513/UD Who Official P 514/TC Shell—used to execute non-interactive commands on a remote system Official P 514/UD Syslog—used for system logging Official P 515/TC Line Printer Daemon—print service Official P 517/UD Talk Official P 518/UD NTalk Official P 520/TC efs, extended file name server Official P 520/UD Routing—RIP Official P 524/TCP NCP (NetWare Core Protocol) is used for a variety things such as access to Official ,UDP primary NetWare server resources, Time Synchronization, etc. 525/UD Timed, Timeserver Official P 530/TCP RPC Official ,UDP 531/TCP AOL Instant Messenger, IRC Unofficial ,UDP 532/TC netnews Official P 533/UD netwall, For Emergency Broadcasts Official P 540/TC UUCP (Unix-to-Unix Copy Protocol) Official P 542/TCP commerce (Commerce Applications) Official ,UDP 543/TC klogin, Kerberos login Official P 544/TC kshell, Kerberos Remote shell Official P 546/TCP DHCPv6 client Official ,UDP 547/TCP DHCPv6 server Official ,UDP 548/TC Apple Filing Protocol (AFP) over TCP Official P 550/UD new-rwho, new-who Official P 554/TCP Real Time Streaming Protocol (RTSP) Official ,UDP 556/TC Remotefs, RFS, rfs_server Official P 560/UD rmonitor, Remote Monitor Official P 561/UD monitor Official P 563/TCP NNTP protocol over TLS/SSL (NNTPS) Official ,UDP 587/TC e-mail message submission [9] (SMTP) Official P 591/TC FileMaker 6.0 (and later) Web Sharing (HTTP Alternate, also see port 80) Official P HTTP RPC Ep Map, Remote procedure call over Hypertext Transfer Protocol, 593/TCP often used by Distributed Component Object Model services and Microsoft
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • N2N: a Layer Two Peer-To-Peer VPN
    N2N: A Layer Two Peer-to-Peer VPN Luca Deri1, Richard Andrews2 ntop.org, Pisa, Italy1 Symstream Technologies, Melbourne, Australia2 {deri, andrews}@ntop.org Abstract. The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by enormous and heterogeneous economic interests, it has become a constrained network severely enforcing client-server communication where addressing plans, packet routing, security policies and users’ reachability are almost entirely managed and limited by access providers. From the user’s perspective, the Internet is not an open transport system, but rather a telephony-like communication medium for content consumption. This paper describes the design and implementation of a new type of peer-to- peer virtual private network that can allow users to overcome some of these limitations. N2N users can create and manage their own secure and geographically distributed overlay network without the need for central administration, typical of most virtual private network systems. Keywords: Virtual private network, peer-to-peer, network overlay. 1. Motivation and Scope of Work Irony pervades many pages of history, and computing history is no exception. Once personal computing had won the market battle against mainframe-based computing, the commercial evolution of the Internet in the nineties stepped the computing world back to a substantially rigid client-server scheme. While it is true that the today’s Internet serves as a good transport system for supplying a plethora of data interchange services, virtually all of them are delivered by a client-server model, whether they are centralised or distributed, pay-per-use or virtually free [1].
    [Show full text]
  • VNC Connect Security Whitepaper
    VNC Connect security whitepaper VNC Connect security whitepaper Version 1.3 Contents Contents .................................................................................................................................................................... 2 Introduction ............................................................................................................................................................... 3 Security architecture ................................................................................................................................................. 4 Cloud infrastructure ................................................................................................................................................... 7 Client security ........................................................................................................................................................... 9 Development procedures ........................................................................................................................................ 12 Summary ................................................................................................................................................................. 13 VNC Connect security whitepaper Introduction Customer security is of paramount importance to RealVNC. As such, our security strategy is ingrained in all aspects of our VNC Connect software. We have invested extensively in our security, and take great pride in our successful
    [Show full text]
  • Qos: NBAR Protocol Library, Cisco IOS XE Release 3.8S
    QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 C O N T E N T S 3COM-AMP3 through AYIYA-IPV6-TUNNELED 34 3COM-AMP3 35 3COM-TSMUX 36 3PC 37 9PFS 38 914C G 39 ACAP 40 ACAS 40 ACCESSBUILDER 41 ACCESSNETWORK 42 ACP 43 ACR-NEMA 44 ACTIVE-DIRECTORY 45 ACTIVESYNC 45 ADOBE-CONNECT 46 AED-512 47 AFPOVERTCP 48 AGENTX 49 ALPES 50 AMINET 50 AN 51 ANET 52 ANSANOTIFY 53 ANSATRADER 54 ANY-HOST-INTERNAL 54 AODV 55 AOL-MESSENGER 56 AOL-MESSENGER-AUDIO 57 AOL-MESSENGER-FT 58 QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S ii Contents AOL-MESSENGER-VIDEO 58 AOL-PROTOCOL 59 APC-POWERCHUTE 60 APERTUS-LDP 61 APPLEJUICE 62 APPLEQTC 63 APPLEQTCSRVR 63 APPLIX 64 ARCISDMS 65 ARGUS 66 ARIEL1 67 ARIEL2 67 ARIEL3 68 ARIS 69 ARNS 70 ARUBA-PAPI 71 ASA 71 ASA-APPL-PROTO 72 ASIPREGISTRY 73 ASIP-WEBADMIN 74 AS-SERVERMAP 75 AT-3 76 AT-5 76 AT-7 77 AT-8 78 AT-ECHO 79 AT-NBP 80 AT-RTMP 80 AT-ZIS 81 AUDIO-OVER-HTTP 82 AUDIT 83 AUDITD 84 AURORA-CMGR 85 AURP 85 AUTH 86 QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S iii Contents AVIAN 87 AVOCENT 88 AX25 89 AYIYA-IPV6-TUNNELED 89 BABELGUM through BR-SAT-MON 92 BABELGUM 93 BACNET 93 BAIDU-MOVIE 94 BANYAN-RPC 95 BANYAN-VIP 96 BB 97 BBNRCCMON 98 BDP 98 BFTP 99 BGMP 100 BGP 101 BGS-NSI 102 BHEVENT 103 BHFHS 103 BHMDS 104 BINARY-OVER-HTTP 105 BITTORRENT 106 BL-IDM 107 BLIZWOW 107 BLOGGER 108 BMPP 109 BNA 110 BNET 111 BORLAND-DSJ 112 BR-SAT-MON 112
    [Show full text]
  • Vysoké Učení Technické V Brně Detekcia Seedboxov V Sieti Bittorrent
    VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMAČNÍCH TECHNOLOGIÍ FACULTY OF INFORMATION TECHNOLOGY ÚSTAV INFORMAČNÍCH SYSTÉMŮ DEPARTMENT OF INFORMATION SYSTEMS DETEKCIA SEEDBOXOV V SIETI BITTORRENT DETECTION OF SEEDBOXES INBITTORRENT NETWORK BAKALÁŘSKÁ PRÁCE BACHELOR’S THESIS AUTOR PRÁCE MARTIN GRNÁČ AUTHOR VEDOUCÍ PRÁCE Ing. LIBOR POLČÁK, Ph.D. SUPERVISOR BRNO 2018 Abstrakt Bakalárska práca sa venuje problematike sledovania a detekcie seedboxov v sieti BitTorrent za pomoci technológie netflow. V teoretickej časti je predstavená a popísaná architektúra P2P, základy a kľúčové pojmy architektúry BitTorrent a teoretická definícia seedboxu. Taktiež sú tu rozobrané metódy pomocou ktorých sa dá detekovať sieťová komunikácia a ďalej je uvedená analýza seedboxov v sieti a hľadanie ich charakteristík. Na základe týchto znalostí a sledovaní je navrhnutá sada nástrojov, ktoré napomáhajú ich detekcií. V praktickej časti je predstavená implementácia týchto nástrojov a výsledky ich testovania. Abstract Bachelor’s thesis is focused on issues with monitoring and detection of seedboxes in Bit- Torrent network with help of netflow technology. In the theoretical part of this thesis is introduced and described P2P architecture, basics and key terms of BitTorrent architec- ture and theoretical definition of seedbox. There are also described specific methods which can be used for detection of network communication and next there is described process of seedbox analysis in network and process of finding its characteristics. On base of this kno- wledge and observations is designed a set of tools,which help with detection of seedboxes. In the practical part of this work is presented implementation of these tools and results of testing these tools. Kľúčové slová BitTorrent, seedbox, detekcia, netflow, analýza, sieťová prevádzka, P2P, netflow Keywords BitTorrent, seedbox, detection, netflow, analysis, network traffic, P2P, netflow Citácia GRNÁČ, Martin.
    [Show full text]
  • List of TCP and UDP Port Numbers
    List of TCP and UDP port numbers From Wikipedia, the free encyclopedia Jump to: navigation, search This is a list of Internet socket port numbers used by protocols of the Transport Layer of the Internet Protocol Suite for the establishment of host-to-host communications. Originally, these port numbers were used by the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP), but are used also for the Stream Control Transmission Protocol (SCTP), and the Datagram Congestion Control Protocol (DCCP). SCTP and DCCP services usually use a port number that matches the service of the corresponding TCP or UDP implementation if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1] However, many unofficial uses of both well- known and registered port numbers occur in practice. Contents [hide] y 1 Table legend y 2 Well-known ports: 0±1023 y 3 Registered ports: 1024±49151 y 4 Dynamic, private or ephemeral ports: 49152±65535 y 5 See also y 6 References y 7 External links [edit] Table legend Color coding of table entries Official Port/application combination is registered with IANA Unofficial Port/application combination is not registered with IANA Conflict Port is in use for multiple applications [edit] Well-known ports: 0±1023 The port numbers in the range from 0 to 1023 are the well-known ports. They are used by system processes that provide widely-used types of network services. On Unix-like operating systems, a process must execute with superuser privileges to be able to bind a network socket to an IP address using one of the well-known ports.
    [Show full text]
  • 19 Internet Activity
    1 Practical Paranoia: macOS 10.13 Security Essentials Author: Marc Mintz Copyright © 2016, 2017 by The Practical Paranoid, LLC. Notice of Rights: All rights reserved. No part of this document may be reproduced or transmitted in any form by any means without the prior written permission of the author. For information on obtaining permission for reprints and excerpts, contact the author at [email protected], +1 888.504.5591. Notice of Liability: The information in this document is presented on an As Is basis, without warranty. While every precaution has been taken in the preparation of this document, the author shall have no liability to any person or entity with respect to any loss or damage caused by or alleged to be caused directly or indirectly by the instructions contained in this document, or by the software and hardware products described within it. It is provided with the understanding that no professional relationship exists and no professional security or Information Technology services have been offered between the author or the publisher and the reader. If security or Information Technology expert assistance is required, the services of a professional person should be sought. Trademarks: Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the author was aware of a trademark claim, the designations appear as requested by the owner of the trademark. All other product names and services identified in this document are used in editorial fashion only and for the benefit of such companies with no intention of infringement of trademark.
    [Show full text]
  • INTERNET-DRAFT M. Ackermann Intended Status: Informational BCBS Michigan N
    INTERNET-DRAFT M. Ackermann Intended Status: Informational BCBS Michigan N. Elkins W. Jouris Inside Products Expires: April 2014 October 3, 2013 Usage of NTP for the PDM DOH IPv6 Extension Header draft-ackermann-tictoc-pdm-ntp-usage-00 Abstract The Performance and Diagnostic Metrics (PDM) Destination Options Header (DOH) for IPv6 defines metrics which are critical for timely end-to-end problem resolution, without impacting an operational production network. These metrics and their derivations can be used for network diagnostics. The base metrics are: packet sequence number and packet timestamp. The timestamp fields require time synchronization at the two end points. This document provides implementation guidelines for implementing Network Time Protocol (NTP) to provide such synchronization. Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/1id-abstracts.html The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html Ackermann Expires April, 2014 [Page 1] INTERNET DRAFT -ackermann-tictoc-pdm-ntp-usage-00 October 2013 Copyright and License Notice Copyright (c) 2013 IETF Trust and the persons identified as the document authors.
    [Show full text]
  • XEP-0347: Internet of Things - Discovery
    XEP-0347: Internet of Things - Discovery Peter Waher mailto:peterwaher@hotmail:com xmpp:peter:waher@jabber:org http://www:linkedin:com/in/peterwaher Ronny Klauck mailto:rklauck@informatik:tu-cottbus:de xmpp:TBD http://www-rnks:informatik:tu-cottbus:de/~rklauck 2018-11-03 Version 0.5.1 Status Type Short Name Deferred Standards Track iot-discovery This specification describes an architecture based on the XMPP protocol whereby Things can be in- stalled and safely discovered by their owners and connected into networks of Things. Legal Copyright This XMPP Extension Protocol is copyright © 1999 – 2020 by the XMPP Standards Foundation (XSF). Permissions Permission is hereby granted, free of charge, to any person obtaining a copy of this specification (the ”Specification”), to make use of the Specification without restriction, including without limitation the rights to implement the Specification in a software program, deploy the Specification in a network service, and copy, modify, merge, publish, translate, distribute, sublicense, or sell copies of the Specifi- cation, and to permit persons to whom the Specification is furnished to do so, subject to the condition that the foregoing copyright notice and this permission notice shall be included in all copies or sub- stantial portions of the Specification. Unless separate permission is granted, modified works that are redistributed shall not contain misleading information regarding the authors, title, number, or pub- lisher of the Specification, and shall not claim endorsement of the modified works by the authors, any organization or project to which the authors belong, or the XMPP Standards Foundation. Warranty ## NOTE WELL: This Specification is provided on an ”AS IS” BASIS, WITHOUT WARRANTIES OR CONDI- TIONS OF ANY KIND, express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE.
    [Show full text]
  • Microsoft Free Download Vpn Connect to Servers from 79+ Countries
    microsoft free download vpn Connect to servers from 79+ countries. ZenMate Ultimate has about 3500 servers from over 79 different countries for you to choose from. Select the country you want and stay 100% anonymous online. No-Logs Policy. ZenMate VPN never records any of our users' online activity. Make sure you're truly anonymous when you're surfing the web with our free browser extension. Stay Protected on Multiple Devices. 1 ZenMate Ultimate subscription covers an unlimited number of devices. This way you can keep all your gadgets safe when surfing the web. Military-Grade Encryption. ZenMate uses AES-256 encryption, the military standard. This way your data and connection are impossible to hack. Unblock Websites. Bypass governmental restrictions and unblock websites that aren't available in your location by connecting to one of our remote servers. Trusted by Over 47 Million Users. Over 47 million people choose ZenMate VPN to keep all their sensitive information private and to bypass geo-restrictions. Here’s What Our Users Have to Say. Choose the Plan That's Right for You. 1 Month. 1 Year. 6 Months. Frequently Asked Questions. To use ZenMate VPN on Microsoft Edge, simply add the extension from the Microsoft Edge Store. Create and verify your account. Then you'll see the ZenMate icon next to your search bar. Click on it and in the lower left corner of the pop-up window you'll see a button to turn ZenMate on. To download the best Edge VPN available simply visit the Microsoft Edge Store and add ZenMate VPN to your browser.
    [Show full text]
  • Well Known TCP and UDP Ports Used by Apple Software Products
    Well known TCP and UDP ports used by Apple Languages English software products Symptoms Learn more about TCP and UDP ports used by Apple products, such as OS X, OS X Server, Apple Remote Desktop, and iCloud. Many of these are referred to as "well known" industry standard ports. Resolution About this table The Service or Protocol Name column lists services registered with the Internet Assigned Numbers Authority (http://www.iana.org/), except where noted as "unregistered use." The names of Apple products that use these services or protocols appear in the Used By/Additional Information column. The RFC column lists the number of the Request For Comment document that defines the particular service or protocol, which may be used for reference. RFC documents are maintained by RFC Editor (http://www.rfc- editor.org/). If multiple RFCs define a protocol, there may only be one listed here. This article is updated periodically and contains information that is available at time of publication. This document is intended as a quick reference and should not be regarded as comprehensive. Apple products listed in the table are the most commonly used examples, not a comprehensive list. For more information, review the Notes below the table. Tip: Some services may use two or more ports. It is recommend that once you've found an instance of a product in this list, search on the name (Command-F) and then repeat (Command-G) to locate all occurrences of the product. For example, VPN service may use up to four diferent ports: 500, 1701, 1723, and 4500.
    [Show full text]
  • Institutionen För Datavetenskap Department of Computer and Information Science
    Institutionen för datavetenskap Department of Computer and Information Science Final thesis Implementing extended functionality for an HTML5 client for remote desktops by Samuel Mannehed LIU-IDA/LITH-EX-A—14/015--SE 6/28/14 Linköpings universitet Linköpings universitet SE-581 83 Linköping, Sweden 581 83 Linköping Final thesis Implementing extended functionality for an HTML5 client for remote desktops by Samuel Mannehed LIU-IDA/LITH-EX-A--14/015--SE June 28, 2014 Supervisors: Peter Åstrand (Cendio AB), Maria Vasilevskaya (IDA) Examiner: Prof. Simin Nadjm-Tehrani På svenska Detta dokument hålls tillgängligt på Internet – eller dess framtida ersättare – under en längre tid från publiceringsdatum under förutsättning att inga extra-ordinära omständigheter uppstår. Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstaka kopior för enskilt bruk och att använda det oförändrat för ickekommersiell forskning och för undervisning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. All annan användning av dokumentet kräver upphovsmannens medgivande. För att garantera äktheten, säkerheten och tillgängligheten finns det lösningar av teknisk och administrativ art. Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan beskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsmannens litterära eller konstnärliga anseende eller egenart. För ytterligare information om Linköping University Electronic Press se förlagets hemsida http://www.ep.liu.se/ In English The publishers will keep this document online on the Internet - or its possible replacement - for a considerable time from the date of publication barring exceptional circumstances.
    [Show full text]