Agree with Peter go with a VPN it possible. If not then limit the source address range that you are opening the port to on your firewall. You can always look at your firewall log to see what IP address you came in on at what time.
As for buffer overflows it seems to be the easiest method to find an exploit. I have seen security guys pass a string of characters that are unique. The oveflowing buffer then passes on the remainder of the string and so you can work out at what point the buffer oveflows. Also web servers may have exploits that allow foreseen access; in the old days you could navigate a computer hosting Windows IIS4 by passing directory commands in http and as most installs were in the default c:\inetsrv you could do what you liked -- Paul_B Paul ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Slimserver 6.5.1 on EPIA VIA EN15000 Mini-ITX running Windows 2003 R2. Remote storage QNAP(1.2.1)~(160GB Maxtor) SB3 (x1) RIP - dBpowerAMP R12 (Alpha) to FLAC ID3 Tags - MP3Tag v2.36 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ------------------------------------------------------------------------ Paul_B's Profile: http://forums.slimdevices.com/member.php?userid=3039 View this thread: http://forums.slimdevices.com/showthread.php?t=30564 _______________________________________________ discuss mailing list discuss@lists.slimdevices.com http://lists.slimdevices.com/lists/listinfo/discuss