Ping Sweeps and Port Scans THESIS STATEMENT Nefarious computer activities, such as port scans and ping sweeps, which can lead to infringement of systems of a company or network, which enables the intruders to gain access to the systems and do changes in the settings or extract important information. These activities can be detected and stopped or prevented using special tools. INTRODUCTION The two most common nefarious computer activities are Ping Sweeps and Port Scans. They lead to infringement of systems by intruders which can harm the whole system or network. These probes can be detected and prevented so Its better to be safe than sorry. Port Scans It is one of the most common nefarious computer activities. The intruders hit the target machine and discovers the services being run on it. They plan to attach on any vulnerable service. If succeeded they can get an access over the machine through exploit. Java and Perl are the two languages in which exploit programs can be easily made. A good programmer can make this in just 15 to 20 minutes of time. Generally the port scanning rely on the theory that the target host is compatible with Transmission Control Protocol. There