Liste des Groupes | Revenir à se design |
It's not going to suddenly decide that, e.g., PhotoShop needs access toMost users have banal needs for a firewall. If running Windows hosts,The host based filter is worthless if the user is administrator (like most Windows users are) because malware can configure/disable
then the filter in the host is even finer-grained than a filter in
an external firewall (as the host-based filter can be tailored
to specific applications).
the firewall as it likes.
Do you have more than one host? Printer? etc. How many thousands ofIt does if you watch the logs for anything unusual.I don't permit outbound connections to a long list of countries.>
You're thinking two-dimensionally. Your *neighbor*'s PC can be acting as
a C&C node for a foreign actor. Just like the camera INSIDE your "perimeter
defenses" (WELCOMED in!) can act on behalf of some other agency.
>
IP filtering doesn't buy you any real protection.
A connection to a neighbor IP address would be obvious to me and I'd likely block it to see if anything legitimate breaks.So, you work for your computer! Most folks want their computers to work
Just like I watch who goes in and out of my house and who I give keys to.Knowing who has keys tells you ONLY who has keys. It tells you nothing
Imagine owning a house where you can't tell who comes and goes or who has keys.
That's how it is for most people online and they aren't interested in knowing more, except perhaps briefly after the ransomwareA simpler solution is simply not to have anything "stealable" on a machine
cleanup.
Who said there is a house? :> Who says it is (physically) *here*?Knowing that there's a house there is information.>I "hide" my file server behind a particular "knock sequence" that is>
only known to folks who should need access to it. Trying to probe
the IP address gets you no information -- it looks like there isn't
a machine AT that IP address.
I don't see any additional value in this provided the file server is restricted to specific IP addresses or networks and the
connection is secure.
Knowing that a server exists is information. (esp if your AUP
prohibits them! :> ) Knowing that there is <something> sitting
at an IP invites probes.
Or in the country I'm from, knowing that there's a castle there is information but if it's surrounded by a moat then good luckWhat difference if you can still get in and inflict whatever damage?
getting in unseen.
Violation of the access protocol could get you an arrow or cannon ball up your somewhere in the past.I have ~70 hosts in my office. Yet, you'd be hard pressed to see more
An address that never reacts to your actions is uninteresting.In many cases you can infer. 1.2.3.0/24 and if you know 1.2.3.20 is active then the rest are likely doing someting potentially
And, unless you can snoop the actual traffic, you can't know that
the address is actually actively moving data!
interesting.
A large battery. The voltage present on the pole is ~11KV (14KV?) or more.Several decades ago, a "transformer" was installed on such a poleIt must have been powered by something, even if everything else was wireless.
(why was it SUDDENLY needed, there?) outside from a business that
sold "growing supplies" to folks who were suspected of being marijuana
growers.
>
The joke was that the transformer had NO wires (primary or secondary)
attached to it. And, a large, rectangular region that resembled a
"window" -- on the side facing the business.
>
"Gee, wanna bet that's a (really poorly disguised) camera??" :>
Les messages affichés proviennent d'usenet.