http

(redirected from port 80)
Also found in: Dictionary, Thesaurus, Legal, Encyclopedia.

http

Hypertext transfer protocol Informatics The most commonly used language protocol for transmitting information in Web sites; http on a web address–a URL indicates to Web browsers, “HTML spoken here”. See Client, HTML, Server, Web browser, World Wide Web. Cf Gopher.

Patient discussion about http

Q. Has anyone ever seen the website http://www.rense.com/general74/DANDI.HTM There is a cancer cure on it. George Cairns had prostate and colon cancer. He used a natural cure and was completely cured of cancer. I am wondering if any one has ever read his websitehttp://www.rense.com/general74/DANDI.HTM

A. oops, cod liver oil increases the absorption of calcium.

Q. I've a chronic pain website & would love 2 get comments on how 2 make it better http://chronicpain.today.c

A. VIDEOS IS GREAT I WILL THAT N THANKS

More discussions about http
References in periodicals archive ?
Unwanted and malicious applications can work over TCP port 80 and appear to be HTTP," he said.
This tunnel typically connects through Port 80 on a firewall - the most likely Web surfing port.
Port 23 remained the most popular target of attacks observed to be originating in China, accounting for more than three times more volume than Port 80, the second-most attacked port within the country.
Five virtual machines or VMs are used for statistics, storage of torrent, balancing, the proxy website on port 80.
Rijhwani, a self-confessed "geek" commented that it appeared "like a port 80 problem".
NMC goes well beyond other NetFlow-based reporting systems that see all port 80 traffic as HTTP, individually classifying a wide variety of applications, including video and voice streaming, instant messaging, file sharing and email.
com, SharePoint to Farmville all run over TCP port 80 as well as encrypted SSL (TCP port 443).
Cloud communication, on the other hand requires no additional channels since it uses http on port 80 which is already allowed through most firewalls.
The company=92s electronic data protection covers more protocols than any other iSecurity solution, including email, instant messenger, P2P applications, and Port 80 traffic.
While most Web traffic is running on Port 80 (or 443 for encrypted traffic), someone hosting malware on Port 81, for example, would be able to fly right by the STM600.
We decided to use TCP port 80 for the client/server communication.
Communication over TCP using HTTP tunneling at port 80