On Monday 03 March 2014 09:04:47 Mark Wendt did opine:

> On Sun, Mar 2, 2014 at 1:59 PM, Gene Heskett <ghesk...@wdtv.com> wrote:
> > I do have such a setup out in the shop building, and have had a fully
> > bridged AP setup there, basically so I wouldn't have to string an
> > almost too short piece of cat5 from the hub to a teeny little table
> > the lappy lives on when I need to sit down and write some gcode by
> > ssh -Y into one of the machine controllers.
> > 
> > At any one time, I have one of those pocket wifi sniffers that can see
> > a half a dozen similar routers scattered about my neighborhood.  In 5
> > or 6 years, I have had one outside signal come into the system and go
> > on out on the internet, apparently uninterested or un-aware of the
> > extent of my local network. No clue if he was watching porn or what,
> > but I reached into the router and disabled the radio, then setup a
> > WPA2/AES login with a loooooong passphrase, and have had no further
> > trouble.  However, trying to get that same security model setup in
> > the Mint14 that is currently on the lappy, I am back to using the
> > short cat5, stretched across the front of the machines and definitely
> > in harms way.
> > 
> > I understand Mint16 is out now, and maybe it has a smarter
> > wpa_supplicant that can do that security, because the cable really is
> > a PIMA.
> > 
> > So, my one "breakin" was benign in its effect on me other than hogging
> > some bandwidth.
> 
> Gene,
> 
> Security by obscurity was once a valid technique.  Still may be
> effective if you live way out in the sticks.
> 
> However, anybody with a car, a laptop, and a wireless network sniffer
> can latch on to a wireless network that's either unprotected, or
> lightly protected.
> 
> My machine controller is hardwired into a full copper network.  Someone
> trying to get into the machine must first breach two firewalls, one on
> the router and one inside the network, and networking must be turned on
> the machine controller in order for someone to get even a chance at
> running a port mapper against it.
> 
> Maybe I'm being paranoid, but I watch attack attempts from all over the
> world at work on a daily basis run against blocks of addresses.  You're
> not really paranoid if they are out to get ya...  ;-)
> 
> Mark

Snirk, but Mark, as far as fancy hackers go, I really am "out in the 
sticks."

FWIW, I run awstats on my web server, and am somewhat puzzled as in any one 
month, I might have 3 or 4 megabytes pulled, and 40% of it goes to Chinese 
domains.  Why?  I also have a subdir with 2nd amendment related stuffs...

Hey, we all have to do our part don't we?

Cheers, Gene
-- 
"There are four boxes to be used in defense of liberty:
 soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
Genes Web page <http://geneslinuxbox.net:6309/gene>

NOTICE: Will pay 100 USD for an HP-4815A defective but
complete probe assembly.


------------------------------------------------------------------------------
Subversion Kills Productivity. Get off Subversion & Make the Move to Perforce.
With Perforce, you get hassle-free workflows. Merge that actually works. 
Faster operations. Version large binaries.  Built-in WAN optimization and the
freedom to use Git, Perforce or both. Make the move to Perforce.
http://pubads.g.doubleclick.net/gampad/clk?id=122218951&iu=/4140/ostg.clktrk
_______________________________________________
Emc-users mailing list
Emc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/emc-users

Reply via email to