port 80


Also found in: Dictionary, Thesaurus, Medical, Legal.

port 80

(1) The number that identifies network packets as Web transactions. All port numbers reside in the header of the packets, and requests that are marked port 80 are processed by the Web server (see TCP/IP port). Port 80 requests may activate any number of different server-side processes before a Web page or some other file is returned to the user. For a list of common port numbers, see well-known port. See port forwarding and HTTP.

(2) An input/output address (port 80h) in a PC that is used to send power-on codes. See POST code and PC I/O addressing.
References in periodicals archive ?
The company=92s electronic data protection covers more protoc= ols than any other iSecurity solution, including email, instant messenger, P2P applications, and Port 80 traffic.
The softphone is both secure and firewall friendly, can utilize HTTP over port 80, bypass customer firewalls, and allows any combination of VoIP and PSTN on any given call.
The ProxySG appliances can differentiate between SSL traffic and other encrypted traffic that uses the firewall's fully open port 80 (HTTP) or 443 (HTTPS).
This is because IM uses popular communication ports to access networks, such as TCP port 80 which is also used by browsers.
RemotePass has a server-based HTTP connection with its own coding, running via port 80, which according to the company ensures a problem-free connection structure despite firewalls, proxy-servers, routers or any other security system.
This type of attack defeats many firewalls and antivirus solutions because port 80, through which Web traffic flows, is typically open, and much of the malicious code is new, so no antivirus signatures exist.
Further, when it is installed, it installs with minimal functionality (just the port 80 listener for the technophiles reading), leaving the additional components to only those organizations that specifically want that functionality.
Web server traffic will be directed to the Web server IP address on TCP port 80.
The analysis shows that more than half of the nearly 500 unique applications found enable accessibility by hopping ports or using port 80 or 443 (typically open to enable web browsing or SSL traffic).
Attack Traffic and Security: Port 80 overtakes Port 445 to become the most targeted port