Internet networking uses the concept of ports to differentiate different programs, or services, located at the same IP address. For example, a computer could run a Web server and an FTP server at the same time using ports 80 and 21, respectively. A port scan attack occurs when one computer scans the ports of another computer in attempt to determine which services are running on the remote computer for purposes of exploitation.
