JavaScript is required to use Bungie.net

Forums

originally posted in: Port forwarding for Strict NAT
Edited by RAIST5150: 11/4/2019 6:21:34 PM
1
Client-side applications open backdoors everyday through firewalls just as easily as they can through UPnP. If you aren't careful what you click in your browser, you can loose access to your system before you know it. The trick is not letting UPnP be accessible from the external interface... something that should not be an issue in modern hardware. That exploit was found YEARS ago. Companies that deal with internet security had testers on their sites for it even. Hardly anyone tests for this stuff in general though... even a simple scanner like the one at speedtest.net is worth doing ( https://www.speedguide.net/scan.php ). People failing to follow best practices with web apps is the culprit far more often than many realize.
English

Posting in language:

 

Play nice. Take a minute to review our Code of Conduct before submitting your post. Cancel Edit Create Fireteam Post

  • I'm pretty sure that the network administrator has taken enough precautions simply even by choosing to use a device that is worth more than a lot of peoples' computers. I can't tell the validity of that test website though, as after 2h of "scanning", it hasn't sent a single packet. Still, I'll simply see if the ports listed in the article below work.

    Posting in language:

     

    Play nice. Take a minute to review our Code of Conduct before submitting your post. Cancel Edit Create Fireteam Post

You are not allowed to view this content.
;
preload icon
preload icon
preload icon