Port-scanning software tests your network to determine which TCP ports are vulnerable to attack. These programs analyze typical TCP ports by default, including HTTP (port 80), Finger (79), FTP (21), NNTP (119), POP3 (110), SMTP (25), and Whois (43); you can specify additional ports if you use them (8080 for a Web server, for example). Depending on the program, you can scan individual IP addresses or ranges. Keep in mind that scans take a widely varying amount of time to complete, from seconds to hours.
The purpose of port scanning is to determine vulnerability to port attacks. Still, that knowledge by itself will only increase your networking fears; the whole point to determining vulnerability is to do something about it. That's where firewall software comes in. Once you've scanned your ports, you can customize your firewall software to monitor and even prevent traffic to and from the vulnerable ports, thereby reducing the risk considerably.
The link for this article located at PC Magazine is no longer available.