A method of establishing a connection to a securednetwork or computer within a network that does not have an open port. Aremote device sends a series of series of connection attempts, in the form ofpackets, to the computer??s closed ports, and the attempts are silently ignored but logged by the firewall. When the remote device has established the predetermined sequence of port connection attempts, a daemon triggersa port to open, and the network connection is established. This security method is analogous to knowing a "secret knock," and only people who know the proper knock sequence will be allowed access. An advantage of using a port knocking technique is that a malicious hacker cannot detect if a device is listening for port knocks.