Using Fport on Windows NT to Map Applications to Open Ports

To develop defense-in-depth computer security, an understanding of various vulnerabilities must be realized before a protection strategy is developed. One element to minimize vulnerabilities is to develop computer security policies, and these policies must be in practice. In addition, risk...
Teena Henson
April 9, 2001

All papers are copyrighted. No re-posting of papers is permitted