Jump to content
The mkiv Supra Owners Club

Question about Firewalls.


RedM

Recommended Posts

Although I build my own PCs I'm not a techie so excuse this question which is presented in Pano-Man-On-The-Street-O-Vision:

 

I was under the impression that routers didn't 'act' or 'appear' as PCs and that's why they are considered a good form of defence. In other words, if someone is looking at your router it doesn't 'look' like a PC so they wouldn't bother to hack or probe any further, whereas a PC does actually look like a PC on the interweb and that's why they look more juicy to hack. I thought a router just looked like part of the interweb and you'd never know there was anything connected to it worth hacking. Is this crap?

 

Also, it's been round for years, but you can't beat a good probe of your ports with 'Shields Up' :) A quick & basic check of your PC's vulnerability.

 

https://www.grc.com/x/ne.dll?bh0bkyd2

Link to comment
Share on other sites

Although I build my own PCs I'm not a techie so excuse this question which is presented in Pano-Man-On-The-Street-O-Vision:

 

I was under the impression that routers didn't 'act' or 'appear' as PCs and that's why they are considered a good form of defence. In other words, if someone is looking at your router it doesn't 'look' like a PC so they wouldn't bother to hack or probe any further, whereas a PC does actually look like a PC on the interweb and that's why they look more juicy to hack. I thought a router just looked like part of the interweb and you'd never know there was anything connected to it worth hacking. Is this crap?

 

Also, it's been round for years, but you can't beat a good probe of your ports with 'Shields Up' :) A quick & basic check of your PC's vulnerability.

 

https://www.grc.com/x/ne.dll?bh0bkyd2

 

Short answer is: Windows is piss-easy to hack, so why bother with harder stuff?

 

The longer answer is that by routers running inflexible operating systems means that there is less to be taken advantage of - you can't add software, services, trojans, zombies etc. Still doesn't mean people won't hack them though, because they can be used to hop onto something else, perhaps appearing as a trusted host on the internal network.

Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. You might also be interested in our Guidelines, Privacy Policy and Terms of Use.