tangent
IPCT Contributor
- May 12, 2016
- 4,618
- 3,972
To advocate this (easily some of the worst security advice I can remember seeing on the internet) you pretty much have to be a troll or maybe you just like the feeling of being violated. If you're a cheapskate and what to run ancient hardware, there's a solution it's called linux and it actually still gets security patches.>...When I want to talk to them, I'll bring up a browser (like ie6, because it's fast and simple) and contact the camera.
...
the SMTP server is circa 1999 (Post.Office by now defunct Software.com). Great software - it's been running on our NT4 server for the past 17 years.
I'm not swayed at all by new / shiney things or the IT peer pressure that forces others upgrade. Ever here of "The Emperor's New Clothes" ? By the way, I'm reading this forum and posting this on my home PC - Windows 98se with KernelEx, 2 GB ram, and 3.5 TB installed SATA hard drives with a P4-3.5 ghz CPU.
Straight out of high school I used to think if you're behind a NAT don't forward ports to anything insecure, don't use standard ports, use antivirus, turn off some pdf and office features, keep your software updated, are careful about what you open and run a syslog server you're reasonably secure. Then I saw saw some of the security measures used by my university and decided to restrict forwarded ports to specific ip ranges and install an open source hids. I saw very frequent attempts to access my ssh server (on a non-standard port) and switched from a password to keys and port knocking. I made the mistake of forwarding RDP on a non-standard port (I couldn't ssh tunnel from certain parts of the campus network) and only certain IPs could connect and I generally had things locked down pretty well (or so I thought). Then I had a conversation with a friend about an emerging security topic, someone was listening and the rest is history.