JavaScript is required to use Bungie.net

論壇

原先發佈於: Port forwarding for Strict NAT
由RAIST5150編輯: 11/4/2019 6:21:34 PM
1
Client-side applications open backdoors everyday through firewalls just as easily as they can through UPnP. If you aren't careful what you click in your browser, you can loose access to your system before you know it. The trick is not letting UPnP be accessible from the external interface... something that should not be an issue in modern hardware. That exploit was found YEARS ago. Companies that deal with internet security had testers on their sites for it even. Hardly anyone tests for this stuff in general though... even a simple scanner like the one at speedtest.net is worth doing ( https://www.speedguide.net/scan.php ). People failing to follow best practices with web apps is the culprit far more often than many realize.
English

文章張貼語言:

 

以禮待人。發佈文章前請花點時間查看我們的行為準則 取消 編輯 創立火力戰隊 文章

  • I'm pretty sure that the network administrator has taken enough precautions simply even by choosing to use a device that is worth more than a lot of peoples' computers. I can't tell the validity of that test website though, as after 2h of "scanning", it hasn't sent a single packet. Still, I'll simply see if the ports listed in the article below work.

    文章張貼語言:

     

    以禮待人。發佈文章前請花點時間查看我們的行為準則 取消 編輯 創立火力戰隊 文章

你無權檢閱此內容
;
preload icon
preload icon
preload icon