please do not host on your desktop windows operating system any lite server or microsoft powered server on the public internet via your domestic internet connection as it will have known and unknown buffer overrun vulnerabilites and be inviting state sponsored and in independant criminal hackers to take ownership of your hardware and data for their own purposes. If you value your ownership of your own computer systems and the data held on them. And access control lists are only as good as the programming of the buffers and parsing sanity checks preventing remote code execution. If windows login interface is exposed to an attacker it is trivial to brute force names and fail a few common password choices and lockout any account for both local and remote logins And digest login authentication if used as an access control layer is not secure as it is reusable once exfiltrated by any method known or unknown. both inherantly vulnerable to either infiltration/exfiltration and denial of service. Two security subsystems: basically password and windows security system. 1:Microsoft Corporation are not an industry recognised encryption certification body! 2:Microsoft are renowned for implimenting the most breakable encryption systems on the planet as well as programming vulnerabilities that bypasses the encryption completely! I have two problems with that first claim. Two security subsystems are available with the ability to assign rights to each user: password protection and Windows security system." You can specify the security level in the server settings. ![]() It is conspicuous in its total absence in the description above any mention of what level of authentication is enforcable, single or two factor or better, any mention of strong encryption of the connections.Īll data LiteManager sends over the network is encrypted with the secure encryption algorithms certified by the Microsoft Corporation. Remote access limited to LAN access is more sensible and IF remote access over the internet is a necesity then the LAN should be accessed via strong and well encrypted VPN hosted on that LAN so the remote access be completely concealed inside the LAN and VPN extension of the LAN and not subjectable to random probes and followed by in depth probes and access attempts and denial of service attacks. ![]() Remote access to a computer over the internet is just asking to be pwned, remote telnet to a computer over the internet is just plain insane!
0 Comments
Leave a Reply. |