Port Numbers
Command Line
General/Misc.
Malware
Cryptography
100
The default port number for HTTP is this.
80
100
This command changes the permissions of a file or directory
chmod
100
The acronym CIA stands for this in cyber security
Confidentiality, Integrity, Availability
100
The computer speech “bug” was introduced because of this
A literal bug being caught in Harvard's Mark II calculator (1945)
100
This is the original substitution cipher
Caesar or Rot13
200
This is the default port number for SSH
22
200
This command changes the owner of a file or directory
chown
200
This network node filters/blocks network traffic based upon heuristic rules
Firewall
200
This kind of virus pretends to be a legitimate program
Trojan
200
This symmetric key encryption algorithm succeeded DES
AES
300
A DNS server is usually set on this port number
53
300
This command will locate all C++ files on your entire system
(find / -n “*.cpp”)
300
An undocumented feature in a program is called this
Easter Egg
300
This kind of virus encrypts your computer and asks for cash money
Ransomeware
300
This is what AES stands for
Advanced Encryption Standard
400
This is the default port number for ICMP
None
400
Using this command you can delete your entire filesystem
rm -rf --no-preserve-root /
400
This is the main security concern of cloud applications
Privacy
400
This kind of malware propagates through the internet
Worm
400
This technique is used to protect hashes from rainbow tables
Salting
500
Syslog uses this port number
514
500
You can utilize this lesser known VIM command to indent five lines at once
5>> OR >5>
500
This is the most commonly used key exchange protocol
Diffie-Hellman
500
This was the first computer worm ever created
Morris worm
500
This type of 256 bit encryption is comparable with RSA-3072
Elliptic Curve Cryptography