... use. So how do we find out? In this case it is easy. Let's read his Phrack articles! [http://phrack.org/issues.html?issue=51&id=11#article] His first one, in Phrack 51, states: "These ports represent potential communication channels. Mapping their existence facilitates the exchange of information with the host, and thus it is quite useful for anyone wishing to explore their networked environment, including hackers." Well now, that isn't so bad. However, let's take some quotes from the article: - "Scanning, as a method for discovering exploitable communication channels" # The reason we need scanning for... - "Some peopl ...