Insecure Network Ports and Secure Alternatives