Exactly what are port scan attacks and exactly how do they really end up being averted?