QUOTE(Al @ Jun 8 2003, 9:13 PM)
Hey Tacit,
Thanks for explination.
To clarify thou, say if I open my xxxx port in my OS X firewall and then open the same port to that designated Mac on my router to use iTunes streaming. But, I don't have iTunes running at the time, it still leaves that port wide open. Wouldn't that be vulnerable to a hack?
"To clarify thou, say if I open my xxxx port in my OS X firewall and then open the same port to that designated Mac on my router to use iTunes streaming. But, I don't have iTunes running at the time, it still leaves that port wide open. Wouldn't that be vulnerable to a hack?"No.
A port that is "stealth" is like an office building telephone extension that gives you a recording "We're sorry, you have reached an extension that does not exist."
A port that is "open" but has no server software running to receive messages on it is like a telephone extension that rings and rings and rings, but nobody picks up the phone.
A port that is "open" and has server software running on it is like a telephone extension where someone answers the phone.
If no service whatsoever is running on a port, the computer can't be hacked on that port.