keep up with known vulnerabilities
keep up with known vulnerabilities. Here are some examples of sites that regularly post an updated list of isolated vulnerabilities:
http://www.hardened-php.net/advisories.15.html
http://www.milw0rm.com/
http://www.twitter.com/milw0rm
One of the most common methods an attacker will use is to use a search engine to isolate sites running content management systems with known security holes and using the known exploit to gain access to your system. Keeping a watchful eye on matters such as this is a very important task as system administrator.
How to check if the port is associated with the official list of known services.
Example:
cat /etc/services | grep 834
This command returns no output. This indicates that while the port is in the reserved range (meaning 0 through 1023) and requires root access to open, it is not associated with a known service.
Next, check for information about the port using netstat or lsof. To check for port 834 using netstat, use the following command:
The lsof command reveals similar information since it is also capable of linking open ports to services:
These tools reveal a great deal about the status of the services running on a machine. These tools are flexible and can provide a wealth of information about network services and configuration. Consulting the man pages for lsof, netstat, nmap, and services is therefore highly recommended.