Web And Database Port Listing

September 26, 2007 at 4:57 pm (General, languages)

If you are about to peep into web technology, here is something which will interest you. The whole of web architecture is divided on basis of ports. A particular port offers particular service. These ports can be standard or can be manually assigned for user defined services. Here is the port listing for some standard applications…

Port

Server

66

Oracle SQL*Net

80

Hyper Text Transfer Protocol (HTTP)

81

HTTP Proxy, Alternative HTTP Port, Cobalt Server Administration Port

443

Secure Socket Layer (SSL)

445

Microsoft SQL Server over NetBIOS

457

UnixWare/Netscape FastTrack Server

1080

SOCKS Proxy

1100

Oracle WebCache Listener

1241

KaZaA File Sharing Server (HTTP-like protocol)

1352

Lotus Domino (Notes)

1433

Microsoft SQL Server 2000

1434

Microsoft SQL Server over TCP/IP Redirector

1521–1530

Oracle

1944

Microsoft SQL Server 7

2301

Compaq Insight Manager, Compaq Survey Utility

3128

HTTP Proxy (Squid, NetCache, etc.)

3306

mySQL

4000

Oracle WebCache Listener

4001

Oracle WebCache Listener

4002

Oracle WebCache Listener

4100

Sybase 11.0 (jConnect)

5000

Sybase 12.x

5432

PostgreSQL

5800

VNC HTTP Console Port #1

5801

VNC HTTP Console Port #2

5802

VNC HTTP Console Port #3

6346

Gnutella (HTTP-like protocol)

6347

Gnutella (HTTP-like protocol)

7001

BEA WebLogic

7002

BEA WebLogic

8000

HTTP Proxy, Alternative HTTP Port, HP Web JetAdmin Version 6.0

8001

BEA WebLogic

8005

Apache Tomcat Administration Server (non-HTTP protocol)

8080

HTTP Proxy, Alternative HTTP Port

8888

HTTP Proxy, Alternative HTTP Port

30821

Netscape Enterprise Server Administration Server

If you are interested in running your own service, you need to make an entry to the lookup table which is maintained at the server hosting the services. Generally RMI, RPC, Sockets Streaming, CORBA etc. kinds of applications find a great use of ports and their usage.

Advertisements

Permalink Leave a Comment

Programming A Virus

September 18, 2007 at 8:14 am (languages, Security)

Why is everybody scared of computer virus ? because it causes harmful actions to our data and system !! right ?

Logic – If we go to the root, virus just do something that is not desired. Example if we write a program that erases 1 byte from any exe file, that is a virus because the file is no more usable. The main idea is to force a user to run the virus code. This is done by attaching it or embedding the object file along with some utilities.

Code For TSR Virus – Following here is an example code for TSR virus. This is not much harmful. It just changes the attribute (color) of characters present on the screen.

Virus Code

Way For Anti Virus – Every virus has a signature which is easy to match. By this signature only, the identity of virus is done. So, for detecting virus, just search the signature (known as virus definition) in files. 🙂

Caution – Try this programming at your own risk !!

Permalink Leave a Comment

RSA encyption using Java

September 11, 2007 at 4:03 am (Java, languages, Security)

The most difficult implementation faced Java Cryptographic Extension comes in asymmetric key algorithms. The problem is to generate a key and use them after distribution. The answer to the question is to make the keys persistent as soon as they are generated in separate files. Once files for all the (public and private) keys are made, our issue gets over. Doing this is not a simple job because key generation comes from a lots of hidden packages. Attached here are examples of asymmetric key generation and their use.

Key generation Key generator

Encryption RSA Encryption

Permalink 2 Comments

Defining DSN on the fly in java

September 10, 2007 at 1:20 pm (Java, languages)

Talking about the traditional way of connecting to database involves.. Defining a driver making a dsn in the administrator console etc. Here is a short way in which you don’t need to worry about setting a dsn everytime project location gets shifted.

You can use the JDBC-ODBC but define your DSN “on the fly” by passing all ODBC configuration params inside the connect string:

// example for db test1.mdb, user dba, pw sql
con = DriverManager.getConnection(
"jdbc:odbc:Driver={MicroSoft Access Driver (*.mdb)};
DBQ=C:/data/Access/test1.mdb","dba","sql");

Look out: 1 blank before (*.mdb) !!!
Don’t forget the Class.forName() before!

Permalink Leave a Comment

New Features of JDK 1.5

September 10, 2007 at 1:12 pm (Java, languages)

One most common question which I faced in 4/7 interviews for my campus recruitment drive was the topic of this post.

The most prolific feature that comes as an advancement over previous version is “generics and collections”. This feature allows us to come in new era of data structures. It includes enhanced packages for arraylists, vectors, linkedlists etc. and even provides a lots of support for variance in enterprise environment.

Permalink Leave a Comment

New Features in JDK 1.5 Virtual Machine

September 10, 2007 at 1:08 pm (Compilers and Virtual Machines, Java, languages)

JDK 1.5 garbage collector comes with a unique capability called ergonomics over previous version. This gives a set of tuners or command line options for the programmer to tune the garbage collector without peeping into the code itself. This includes a lots of new profilers and type setters.

Permalink Leave a Comment