Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Ports that slow down the port scanning process significantly to the point where it is pointless, but will never lock out a real user for too long. This could include every single port apart from the 'knock' ports, the key is that the source IP is not already in the secure list and hence those ports can be used after a successful knock.

...