although you would thing that they would shut these options down by
default in anything that is supposed to be used as a security
device... only open when enabled...
heck most base Linux distros are built on that.
On Fri, Mar 27, 2009 at 4:05 PM, Stephen <
cryptworks@gmail.com> wrote:
> And once agian why Password security and closeing unused ports is your
> first line in defense against getting Pwned
>
> "Attack vectors are primarily TELNET or SSH that listen on the
> device's WAN interface, accepting weak passwords (such as admin)."
>
--
A mouse trap, placed on top of your alarm clock, will prevent you from
rolling over and going back to sleep after you hit the snooze button.
Stephen
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss