| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Has anyone received one of these? |
On 05 Sep 2019, Bradley D. Thornton said the following... BD> It was kind of a shocker. I've had customers who were bad actors before BD> and had to whack their services and accounts, but I've never gotten BD> something that pretty much insists that I close an open port on one of BD> my machines. I'd suggest that they review what a BBS is, and point them to various sites of BBS-related material on the internet, showing that while telnet is *techincally* a way for people to acquire passwords and such, it's a medium that also relies on closed systems and "security through obscurity". In all the years that telnet has been available for BBSes, I have yet to hear about anyone's system being compromised in any fashion. The only way I could see it happening is if someone were to get the account of a sysop, drop to DOS (if it's even available on that particular BBS), and *maybe* install some malware. Which wouldn't even make sense. People looking to exploit systems are trying to do it on a wide scale, and the effort needed to just gain access to one computer running a BBS wouldn't be worth it. Just sounds like you got caught up in a sweep that checks for open port vulnerabilites, with an automated response. I'd still follow up on a response, though. --- Mystic BBS v1.12 A43 2019/03/02 (Linux/64)* Origin: http://www.throwbackbbs.com -\- meriden, ct -\- (1:142/799) SEEN-BY: 1/19 16/0 120/544 123/130 131 142/799 203/0 221/0 1 6 242 360 229/426 SEEN-BY: 230/0 240/5832 261/38 280/464 5003 292/854 320/119 219 322/0 633/0 SEEN-BY: 633/267 280 281 410 412 509 640/1321 1384 712/848 @PATH: 142/799 320/219 221/1 640/1384 633/280 267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.