although you would thing that they would shut these options down by default in anything that is supposed to be used as a security device... only open when enabled... heck most base Linux distros are built on that. On Fri, Mar 27, 2009 at 4:05 PM, Stephen wrote: > And once agian why Password security and closeing unused ports is your > first line in defense against getting Pwned > > "Attack vectors are primarily TELNET or SSH that listen on the > device's WAN interface, accepting weak passwords (such as admin)." > -- A mouse trap, placed on top of your alarm clock, will prevent you from rolling over and going back to sleep after you hit the snooze button. Stephen --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change your mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss