Agree with Peter go with a VPN it possible. If not then limit the source
address range that you are opening the port to on your firewall. You can
always look at your firewall log to see what IP address you came in on
at what time.

As for buffer overflows it seems to be the easiest method to find an
exploit. I have seen security guys pass a string of characters that are
unique. The oveflowing buffer then passes on the remainder of the string
and so you can work out at what point the buffer oveflows. Also web
servers may have exploits that allow foreseen access; in the old days
you could navigate a computer hosting Windows IIS4 by passing directory
commands in http and as most installs were in the default c:\inetsrv you
could do what you liked


-- 
Paul_B

Paul

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Slimserver 6.5.1 on EPIA VIA EN15000 Mini-ITX running Windows 2003 R2.

Remote storage QNAP(1.2.1)~(160GB Maxtor)
SB3 (x1)
RIP - dBpowerAMP R12 (Alpha) to FLAC
ID3 Tags - MP3Tag v2.36
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
------------------------------------------------------------------------
Paul_B's Profile: http://forums.slimdevices.com/member.php?userid=3039
View this thread: http://forums.slimdevices.com/showthread.php?t=30564

_______________________________________________
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/lists/listinfo/discuss

Reply via email to