• Re: Win11 explorer bug?

    From Don Y@21:1/5 to Edward Rawde on Sat Dec 14 02:11:30 2024
    On 12/13/2024 10:50 PM, Edward Rawde wrote:
    Spending less time on cybersecurity will mean lower knowledge and increased risk of compromise.

    And, in 40+ years, online, I've lost nothing. I guess I must be doing
    something wrong...

    Same here. So I must be too.

    Yet you spend ongoing time and effort!

    And it's fun to see where the brute force and other attacks come from.

    Knock sequences aren't very useful outbound. The last phishing site I visited (out of curiosity) didn't require one.

    Why would a SERVER be making *unsolicited* outbound connections?

    Huh? Phishing sites run web servers. No-one said that such servers make outbound connections.

    I don't use knocking because it's inconvenient and it's debatable whether or not it's any better than a firewall which drops
    everything which isn't from specific IP addresses or networks. Whether knocking or IP filtering is used in front of a server, the
    server should still reject anything which doesn't have valid login credentials.

    But I don't wish to waste time debating it any further.




    The ones who have breaches more likely have managers who don't want anything touched if it's working.

    So the individual who suggests that changes should be made to restrict database connections to nothing other than known IP
    addresses
    or networks, rather than having them open to the entire world, is likely to be ignored. This is, of course, just one of the
    myriad
    reasons why breaches occur.















    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)