On Monday 03 March 2014 09:04:47 Mark Wendt did opine: > On Sun, Mar 2, 2014 at 1:59 PM, Gene Heskett <ghesk...@wdtv.com> wrote: > > I do have such a setup out in the shop building, and have had a fully > > bridged AP setup there, basically so I wouldn't have to string an > > almost too short piece of cat5 from the hub to a teeny little table > > the lappy lives on when I need to sit down and write some gcode by > > ssh -Y into one of the machine controllers. > > > > At any one time, I have one of those pocket wifi sniffers that can see > > a half a dozen similar routers scattered about my neighborhood. In 5 > > or 6 years, I have had one outside signal come into the system and go > > on out on the internet, apparently uninterested or un-aware of the > > extent of my local network. No clue if he was watching porn or what, > > but I reached into the router and disabled the radio, then setup a > > WPA2/AES login with a loooooong passphrase, and have had no further > > trouble. However, trying to get that same security model setup in > > the Mint14 that is currently on the lappy, I am back to using the > > short cat5, stretched across the front of the machines and definitely > > in harms way. > > > > I understand Mint16 is out now, and maybe it has a smarter > > wpa_supplicant that can do that security, because the cable really is > > a PIMA. > > > > So, my one "breakin" was benign in its effect on me other than hogging > > some bandwidth. > > Gene, > > Security by obscurity was once a valid technique. Still may be > effective if you live way out in the sticks. > > However, anybody with a car, a laptop, and a wireless network sniffer > can latch on to a wireless network that's either unprotected, or > lightly protected. > > My machine controller is hardwired into a full copper network. Someone > trying to get into the machine must first breach two firewalls, one on > the router and one inside the network, and networking must be turned on > the machine controller in order for someone to get even a chance at > running a port mapper against it. > > Maybe I'm being paranoid, but I watch attack attempts from all over the > world at work on a daily basis run against blocks of addresses. You're > not really paranoid if they are out to get ya... ;-) > > Mark
Snirk, but Mark, as far as fancy hackers go, I really am "out in the sticks." FWIW, I run awstats on my web server, and am somewhat puzzled as in any one month, I might have 3 or 4 megabytes pulled, and 40% of it goes to Chinese domains. Why? I also have a subdir with 2nd amendment related stuffs... Hey, we all have to do our part don't we? Cheers, Gene -- "There are four boxes to be used in defense of liberty: soap, ballot, jury, and ammo. Please use in that order." -Ed Howdershelt (Author) Genes Web page <http://geneslinuxbox.net:6309/gene> NOTICE: Will pay 100 USD for an HP-4815A defective but complete probe assembly. ------------------------------------------------------------------------------ Subversion Kills Productivity. Get off Subversion & Make the Move to Perforce. With Perforce, you get hassle-free workflows. Merge that actually works. Faster operations. Version large binaries. Built-in WAN optimization and the freedom to use Git, Perforce or both. Make the move to Perforce. http://pubads.g.doubleclick.net/gampad/clk?id=122218951&iu=/4140/ostg.clktrk _______________________________________________ Emc-users mailing list Emc-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/emc-users