| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Note about linksys vulnerabilities |
Ray Hyder wrote: >Mike O'Connor wrote: > > >>Hi All, >> >>C|Net item on newsletter today [Friday - AU]. >> >>How Linksys routers can leave you exposed >> >>Linksys router/firewalls--old and new--have >>suffered a variety of Universal Plug-n-Play problems, port >>vulnerabilities and reliability issues. Apparently, a >>combination of engineering difficulties and design decisions >>are leaving Linksys customers exposed to potential security >>problems, including that new looming threat to all Internet >>users--the mini Distributed Denial of Service attack. >>http://ct.com.com/click?q=12-ja1KIl~Qir9~cDc7Uo7Mb~qkqdRR >> >Hi Mike! I read the article. While I can't refute the authors >experience with his specific model (BEFSX41) of Linksys router, since I >don't have one, I can say that my experience is different than his with >the Linksys router that I have. > >I have a Linksys wrt54g wireless router/4 port switch. It passes ALL of >the "shields up!" tests with flying colors. All ports are in stealth >mode and I have never had a single entry in my incoming log. I have >tested before, during, and after running things like AIM, IRC, etc. and >can't find anything but stealthed ports. I don't run VPN so I can't >test with it running. > >I can't reach the same general conclusion, as you, that Linksys >customers are exposed to security problems. I'm far from an expert on >this subject but I have a healthy concern for inet security particularly >since I'm on a fixed ip address and always interested in finding >potential holes. - ray > Hi Alan/Ray, Apologies, I didn't actually read that page, I just passed the newsletter *precis* on *verbatim*. I don't have a router just ISDN dialup - and using NAT on Injoy - I always get "stealth" on every port without one from Steve's site. I had noticed many recommendations for Linksys routers on the various lists, so thought this might be something new and of interest. Usually I read the pages I refer to first, but was busy at the time with sorting out someone else's disks, & just swapped my normal disk back in to do a quick mailcheck, then logged out again. -- Regards, Mike Failed the exam for -------------------- MCSE - Minesweeper Consultant and Solitaire Expert -------------------- [ISP blocks *.exe, *.cmd, *.bat, *.reg attachments] [Please use zipped versions of above] Yahoo! Groups Links To visit your group on the web, go to: http://groups.yahoo.com/group/os2hardware/ To unsubscribe from this group, send an email to: os2hardware-unsubscribe{at}yahoogroups.com Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ ---* Origin: Waldo's Place USA Internet Gateway (1:3634/1000) SEEN-BY: 633/267 270 @PATH: 3634/1000 12 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.