You'd be surprised by what is out there trying to get into your system. I had port 22 open on my home router to go to a Linux machine so I could SSH into my home network from anywhere in the world, even though I rarely ever leave the 519 area code. One day I went to look at my messages log file and noted numerous brute force attempts to get into my machine. Fortunately, the machine is setup so that you can't SSH in as root, and the single login name that has any kind of access root capable access is intentionally camel cased to thwart name dictionary attacks. The attacks were automated at their end, obviously, but if you have a machine exposed, someone is going to have software that will do anything and everything to gain access through whatever weakest link you have.
I'm on a residential cable line, with an IP that changes periodically, however, I'm still subject to attacks. SSH is a common thing, and what you have written may not be interesting to the hacker space as a whole, however, there is that one idiot out there that WILL take the time to break into your system for jollies. On Fri, Sep 11, 2015 at 6:12 AM, Petr L?z?ovsk? <lazna at volny.cz> wrote: > > Never heard about this. Thinked about this a bit, but have no idea how it > could menace my CGI application. But as far I am a beginner, expecting it > could be a menace but rely on Security by obscurity. Some time a go, when I > start writing CGI powered by windows shell scripts, I have serched (almost > whole) internet for some examples or informations, but I found nothing..... > That means I am lonely with this technique ;-) No hacker will study such > weird technique to intrude only one system on whole internet ;-) > > L. >