Sujet : Re: Win11 explorer bug?
De : blockedofcourse (at) *nospam* foo.invalid (Don Y)
Groupes : sci.electronics.designDate : 14. Dec 2024, 10:11:30
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <vjji4c$3uapa$1@dont-email.me>
References : 1 2 3 4 5 6 7 8 9
User-Agent : Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.2.2
On 12/13/2024 10:50 PM, Edward Rawde wrote:
Spending less time on cybersecurity will mean lower knowledge and increased risk of compromise.
>
And, in 40+ years, online, I've lost nothing. I guess I must be doing
something wrong...
Same here. So I must be too.
Yet you spend ongoing time and effort!
And it's fun to see where the brute force and other attacks come from.
>
Knock sequences aren't very useful outbound. The last phishing site I visited (out of curiosity) didn't require one.
>
Why would a SERVER be making *unsolicited* outbound connections?
Huh? Phishing sites run web servers. No-one said that such servers make outbound connections.
I don't use knocking because it's inconvenient and it's debatable whether or not it's any better than a firewall which drops
everything which isn't from specific IP addresses or networks. Whether knocking or IP filtering is used in front of a server, the
server should still reject anything which doesn't have valid login credentials.
But I don't wish to waste time debating it any further.
>
>
>
The ones who have breaches more likely have managers who don't want anything touched if it's working.
>
So the individual who suggests that changes should be made to restrict database connections to nothing other than known IP
addresses
or networks, rather than having them open to the entire world, is likely to be ignored. This is, of course, just one of the
myriad
reasons why breaches occur.
>
>
>
>
>
>
>
>
>
>
>
>