Port 20 is ftp-data.
Port 21 is ftp.
Port 21 is the control channel. Port 20 is only used in Active mode. In Passive mode, port 20 isn't used, the data channel is established by the client to a high port number on the server. You can check RFC 873 for a LOT more info.
Answer:
C. He can trace the keystrokes used by his friend to log into his account, and then hack it.
Explanation:
A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device. A keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.
In this scenario, Ramsay sent a keylogger spyware to his friend's computer. Thus, the likely consequence of this is that he can trace the keystrokes used by his friend to log into his account, and then hack it.
In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky etc.
Answer:
Use the task-list utility to locate the PID for the explorer.exe process.
Explanation:
To restart Explorer.exe from the command prompt, please follow these steps:
- Open a Windows Command Prompt by clicking on the Start button, entering cmd, and then clicking on the Command Prompt search result that appears.
- When the Command Prompt opens, type t<em>askkill /F /IM explorer.exe </em>& start explorer command into the command prompt and press enter on your keyboard. This command will terminate the explorer.exe and then immediately restart the process so you can see your desktop again.
- After you enter the command, you will see the Windows desktop go away for a second and then restarted. You can now close the Windows Command Prompt as the Explorer.exe process has been restarted.