port 80


Also found in: Dictionary, Thesaurus, Medical, Legal.

port 80

(1) The number that identifies network packets as Web transactions. All port numbers reside in the header of the packets, and requests that are marked port 80 are processed by the Web server (see TCP/IP port). Port 80 requests may activate any number of different server-side processes before a Web page or some other file is returned to the user. For a list of common port numbers, see well-known port. See port forwarding and HTTP.

(2) An input/output address (port 80h) in a PC that is used to send power-on codes. See POST code and PC I/O addressing.
References in periodicals archive ?
Attack Traffic and Security: Port 80 overtakes Port 445 to become the most targeted port
For the first time since the inaugural State of the Internet Report (first quarter of 2008), Port 445 (Microsoft DS) was not the most targeted port for attacks, dropping to third place at 15 percent behind Port 443 (SSL [HTTPS]) at 17 percent and Port 80 (WWW [HTTP] at 24 percent.
It found that security and network managers who believe they can reduce most of their risk by focusing on analysing traffic flowing with port 80 are making a dangerous miscalculation.
The most important thing to realise about Web browser client software, he says, is that it is designed to access a variety of Web sites, typically using Port 80 for regular HTTP access, and Port 443 for HTTPS access.
The Linktivity software uses a port that is open to the Internet, port 80.
ScanSafe claimed that spyware is developing more quickly than the traditional host-based techniques used to identify and fight it, and that firewalls are not able to differentiate between legitimate and hostile port 80 traffic.
But what the firewall doesn't make a distinction about is the fact that once you open a port, such as port 80 for the Web," it's open for all Web traffic, good or bad.
64% of enterprises admit they have opened port 80 - In order for users to access Web-based applications like Instant Messenger programs, personal Web-based e-mail and streaming media, administrators must open port 80 on the firewall to allow Web content to flow to end-users.
One particular application that was vital to our classroom success was DyKnow[R], a classroom management and instructional software package operating over Port 80.
In Germany, Port 80 (HTTP) was the second-most targeted port, likely indicating that attackers were searching for the presence of Web-based applications with known vulnerabilities that could be exploited to gain control of the system or to install malware.
lt;p>The TMS is a true application-layer gateway, something we verified by configuring a rule allowing HTTP traffic and then hitting it with non-HTTP packets destined to TCP Port 80.
This is because IM uses popular communication ports to access networks, such as TCP port 80 which is also used by browsers.