This HTML5 document contains 57 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
yago-reshttp://yago-knowledge.org/resource/
dbohttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
n10http://dbpedia.org/resource/File:
n20https://global.dbpedia.org/id/
yagohttp://dbpedia.org/class/yago/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
freebasehttp://rdf.freebase.com/ns/
n18http://www.emsisoft.com/en/kb/articles/tec021114/
n4http://commons.wikimedia.org/wiki/Special:FilePath/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
dbphttp://dbpedia.org/property/
provhttp://www.w3.org/ns/prov#
dbchttp://dbpedia.org/resource/Category:
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Open_port
rdf:type
yago:Direction106786629 yago:Protocol106665108 yago:WikicatInternetProtocols yago:Abstraction100002137 yago:Message106598915 yago:Communication100033020 yago:Rule106652242
rdfs:label
Open port
rdfs:comment
In security parlance, the term open port is used to mean a TCP or UDP port number that is configured to accept packets. In contrast, a port which rejects connections or ignores all packets directed at it is called a closed port. Ports are an integral part of the Internet's communication model — they are the channel through which applications on the client computer can reach the software on the server. Services, such as web pages or FTP, require their respective ports to be "open" on the server in order to be publicly reachable.
foaf:depiction
n4:Open_ports.png
dcterms:subject
dbc:Internet_protocols
dbo:wikiPageID
5776007
dbo:wikiPageRevisionID
1068269119
dbo:wikiPageWikiLink
dbr:Internet_socket dbr:Packet_(information_technology) dbr:Server_(computing) n10:Open_ports.png dbr:Black_hat_(computer_security) dbr:Transmission_Control_Protocol dbr:Ftp_server dbr:Port_scanning dbr:Firewall_(computing) dbr:Vulnerability_(computing) dbr:Computer_security dbr:Web_page dbr:User_Datagram_Protocol dbr:List_of_TCP_and_UDP_port_numbers dbr:Nmap dbr:Client_(computing) dbc:Internet_protocols dbr:Port_(computer_networking) dbr:Hacker_(computer_security)
dbo:wikiPageExternalLink
n18:
owl:sameAs
freebase:m.0f3_5f wikidata:Q7096402 yago-res:Open_port n20:4t5Cq
dbp:wikiPageUsesTemplate
dbt:Refbegin dbt:Reflist dbt:Refend dbt:Compu-network-stub
dbo:thumbnail
n4:Open_ports.png?width=300
dbo:abstract
In security parlance, the term open port is used to mean a TCP or UDP port number that is configured to accept packets. In contrast, a port which rejects connections or ignores all packets directed at it is called a closed port. Ports are an integral part of the Internet's communication model — they are the channel through which applications on the client computer can reach the software on the server. Services, such as web pages or FTP, require their respective ports to be "open" on the server in order to be publicly reachable. The above use of the terms "open" and "closed" can sometimes be misleading, though; it blurs the distinction between a given port being reachable (unfiltered) and whether there is an application actually listening on that port. Technically, a given port being "open" (in this context, reachable) is not enough for a communication channel to be established. There needs to be an application (service) listening on that port, accepting the incoming packets and processing them. If there is no application listening on a port, incoming packets to that port will simply be rejected by the computer's operating system. Ports can be "closed" (in this context, filtered) through the use of a firewall. The firewall will filter incoming packets, only letting through those packets for which it has been configured. Packets directed at a port which the firewall is configured to "close" will simply be dropped in transit, as though they never existed. Some malicious software acts as a service, waiting for connections from a remote attacker in order to give them information or control over the machine. It is common security practice to close unused ports in personal computers, so as to block public access to any services which might be running on the computer without the user's knowledge, whether due to legitimate services being misconfigured, or the presence of malicious software. Malicious ("black hat") hackers commonly use port scanning software to find which ports are "open" (unfiltered) in a given computer, and whether or not an actual service is listening on that port. They can then attempt to exploit potential vulnerabilities in any services they find.
prov:wasDerivedFrom
wikipedia-en:Open_port?oldid=1068269119&ns=0
dbo:wikiPageLength
3645
foaf:isPrimaryTopicOf
wikipedia-en:Open_port
Subject Item
dbr:Computer_security
dbo:wikiPageWikiLink
dbr:Open_port
Subject Item
dbr:Vulnerability_management
dbo:wikiPageWikiLink
dbr:Open_port
Subject Item
dbr:Anyplace_Control
dbo:wikiPageWikiLink
dbr:Open_port
Subject Item
dbr:Japanese_post_in_Korea
dbo:wikiPageWikiLink
dbr:Open_port
Subject Item
dbr:Reverse_connection
dbo:wikiPageWikiLink
dbr:Open_port
Subject Item
dbr:Postage_stamps_and_postal_history_of_Korea
dbo:wikiPageWikiLink
dbr:Open_port
Subject Item
dbr:Outline_of_computer_security
dbo:wikiPageWikiLink
dbr:Open_port
Subject Item
dbr:TCP_Stealth
dbo:wikiPageWikiLink
dbr:Open_port
Subject Item
dbr:Closed_port
dbo:wikiPageWikiLink
dbr:Open_port
dbo:wikiPageRedirects
dbr:Open_port
Subject Item
wikipedia-en:Open_port
foaf:primaryTopic
dbr:Open_port