JavaScript is required to use Bungie.net

Foren

ursprünglich gepostet in: Port forwarding for Strict NAT
Bearbeitet von RAIST5150: 11/4/2019 6:21:34 PM
1
Client-side applications open backdoors everyday through firewalls just as easily as they can through UPnP. If you aren't careful what you click in your browser, you can loose access to your system before you know it. The trick is not letting UPnP be accessible from the external interface... something that should not be an issue in modern hardware. That exploit was found YEARS ago. Companies that deal with internet security had testers on their sites for it even. Hardly anyone tests for this stuff in general though... even a simple scanner like the one at speedtest.net is worth doing ( https://www.speedguide.net/scan.php ). People failing to follow best practices with web apps is the culprit far more often than many realize.
English

Sprache des Beitrags:

 

Bearbeiten
Vorschau

Benimm dich. Nimm dir eine Minute, um dir unsere Verhaltensregeln durchzulesen, bevor du den Beitrag abschickst. Abbrechen Bearbeiten Einsatztrupp erstellen Posten

  • I'm pretty sure that the network administrator has taken enough precautions simply even by choosing to use a device that is worth more than a lot of peoples' computers. I can't tell the validity of that test website though, as after 2h of "scanning", it hasn't sent a single packet. Still, I'll simply see if the ports listed in the article below work.

    Sprache des Beitrags:

     

    Bearbeiten
    Vorschau

    Benimm dich. Nimm dir eine Minute, um dir unsere Verhaltensregeln durchzulesen, bevor du den Beitrag abschickst. Abbrechen Bearbeiten Einsatztrupp erstellen Posten

Es ist dir nicht gestattet, diesen Inhalt zu sehen.
;
preload icon
preload icon
preload icon