(redirected from port 80)
Also found in: Dictionary, Thesaurus, Medical, Encyclopedia, Wikipedia.
See: behavior, complexion, conduct, deportment, destination, haven, manner

PORT. A place to which the officers of the customs are appropriated, and which include the privileges and guidance of all members and creeks which are allotted to them. 1 Chit. Com. Law, 726; Postlewaith's Com. Dict. h.t.; 1 Chit. Com. L. Index, h.t. According to Dalloz, a port is a place within land, protected against the waves and winds, and affording to vessels a place of safety. Diet. Supp. h.t. By the Roman law a port is defined to be locus, conclusus, quo importantur merces, et unde exportantur. Dig. 50,16, 59. See 7 N. S. 81. 2. A port differs from a haven, (q.v.) and includes something more. 1st. It is a place at which vessels may arrive and discharge, or take in their cargoes. 2. It comprehends a vale, city or borough, called in Latin caput corpus, for the reception of mariners and merchants, for securing the goods, and bringing them to market, and for victualling the ships. 3. It is impressed with its legal character by the civil authority. Hale de Portibus Mar. c. 2; 1 Harg. 46, 73; Bac. Ab. Prerogative, D 5; Com. Dig. Navigation, E; 4 Inst. 148; Callis on Sewers, 56; 2 Chit. Com. Law, 2; Dig. 60, 16, 59; Id. 43, 12, 1, 13; Id. 47, 10, 15, 7; Id. 39, 4, 15.

References in periodicals archive ?
Two-thirds of the 750 applications tracked, even client server and peer-to-peer (P2P) applications, can pass as Web traffic by hopping ports, using port 80, or hiding within SSL.
Kaplan will discuss how although traffic has increased at the port 80 level, most organizations do not have visibility into that layer of their network.
A large amount of spyware, phishing attacks, crimeware, and malicious websites are now crafted to avoid detection by using ports other than Port 80, which is normally set for HTTP traffic.
NASDAQ:BCSI), formerly Cacheflow Inc, is a Web security company that delivers security appliances designed to combat the increasing number of Web-based threats targeting port 80 "holes" in the enterprise security infrastructure.
We've seen a huge increase in serious application attacks targeting port 80," says Tim Goodwin, Vice President of F5 Japan.
A large amount of spyware, phishing attacks, and malicious websites are now crafted to avoid using Port 80, which is normally set for HTTP traffic.
Breach provides security solutions overlooked by network IDSs, specifically by providing Port 80 and Port 443 protection," said Marc Shinbrood, CEO, Breach Security.
For example, instead of assuming that all traffic going through Port 80 is web traffic, SecureWorks is able to specify if the traffic is truly web traffic or if it is something else, such as instant messaging.
Many proprietary media services traverse NATs by tunneling using HTTP or Port 80, but this approach is not as security-enhanced, robust or scalable as the ICE methodology.
While port 80 is the most common firewall port used, it can be configured to use other ports if required.
The rise in non port 80 hosted sites and the number of sites which are hosting phishing attacks continues to lead us to believe that the number of machines that are compromised and are being used to host these attacks is growing," the APWG reported.
Network traffic that moves across port 80 and 443 must be managed at the "data-level" to protect against a new breed of XML-related attacks.