hypertext transfer protocol

(redirected from port 80)
Also found in: Thesaurus, Medical, Legal, Encyclopedia.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.hypertext transfer protocol - a protocol (utilizing TCP) to transfer hypertext requests and information between servers and browsershypertext transfer protocol - a protocol (utilizing TCP) to transfer hypertext requests and information between servers and browsers
communications protocol, protocol - (computer science) rules determining the format and transmission of data
Based on WordNet 3.0, Farlex clipart collection. © 2003-2012 Princeton University, Farlex Inc.
References in periodicals archive ?
Microsoft was making a connection to ssw.live.com over an HTTP connection on port 80. The content was encrypted in a way that made it impossible to determine what was being sent.
Port 23 remained the most popular target of attacks observed to be originating in China, accounting for more than three times more volume than Port 80, the second-most attacked port within the country.
Five virtual machines or VMs are used for statistics, storage of torrent, balancing, the proxy website on port 80.
Rijhwani, a self-confessed "geek" commented that it appeared "like a port 80 problem".
NMC goes well beyond other NetFlow-based reporting systems that see all port 80 traffic as HTTP, individually classifying a wide variety of applications, including video and voice streaming, instant messaging, file sharing and email.
Today, applications from Salesforce.com, SharePoint to Farmville all run over TCP port 80 as well as encrypted SSL (TCP port 443).
To successfully defend against such sophistication of attacks, CIOs and CSOs should ensure that they plug the loop holes in their current systems - ensure their systems accept only accept valid HTTP/S requests on port 80 and port 443 and doing this will ensure network layer attacks such as TCP SYN floods, UDP floods, and other network packet based attacks are deflected.
Cloud communication, on the other hand requires no additional channels since it uses http on port 80 which is already allowed through most firewalls.
For example, this study ignored the identification of Port 80 and Port 443 because P2P applications also communicate through these two ports.
Using HTTP traffic for bot and C&C communication makes bots almost invisible in general Internet traffic and guaranties that the user will not block port 80, on which all his http browsing relies.
The company=92s electronic data protection covers more protocols than any other iSecurity solution, including email, instant messenger, P2P applications, and Port 80 traffic.
While most Web traffic is running on Port 80 (or 443 for encrypted traffic), someone hosting malware on Port 81, for example, would be able to fly right by the STM600.<p>Although the STM600 doesn't match the feature set and flexibility of some of the high-end Web security gateways from vendors such as Bluecoat, Cisco, and Trend Micro, it has a robust and solid design appropriate to midsized and small businesses.<p>By making a serious attempt to match the Web security needs of small businesses, Netgear has created a product that sits between the relatively spare feature set of the UTM firewall and the expensive depth of enterprise-class Web security gateways.