New Posts  All Forums:Forum Nav:

I am paranoid. - Page 3

post #21 of 30
Quote:
Originally Posted by darksideleader View Post
all routers have built in firewall and nat.

That's all the security you need unless you frequent searching for nude pictures of celebrities and dl pictures that end in .exe
NOT all routers have built in firewalls. NAT can be used on either a firewall or a router. Do I need to explain the difference of Firewall vs a Router?
The Raven
(16 items)
 
  
CPUMotherboardGraphicsGraphics
i7-2600K Gigabyte GA-P67A-UD5-B3 EVGA GTX 570 SC EVGA GTX 570 SC 
RAMHard DriveOptical DriveCooling
16GB G.SKILL Ripjaws X 1866 Samsung 840 Pro  iHAS324 - Lite-On DVD-RW Noctua NH-D14 
OSMonitorMonitorKeyboard
Windows 10 ASUS VN248 ASUS VN248 Logitech G510 
PowerCaseMouse
XFX 850W BE SILVERSTONE RV02B-EW Logitech MX518 
  hide details  
Reply
The Raven
(16 items)
 
  
CPUMotherboardGraphicsGraphics
i7-2600K Gigabyte GA-P67A-UD5-B3 EVGA GTX 570 SC EVGA GTX 570 SC 
RAMHard DriveOptical DriveCooling
16GB G.SKILL Ripjaws X 1866 Samsung 840 Pro  iHAS324 - Lite-On DVD-RW Noctua NH-D14 
OSMonitorMonitorKeyboard
Windows 10 ASUS VN248 ASUS VN248 Logitech G510 
PowerCaseMouse
XFX 850W BE SILVERSTONE RV02B-EW Logitech MX518 
  hide details  
Reply
post #22 of 30
Quote:
Originally Posted by bratas View Post
NOT all routers have built in firewalls. NAT can be used on either a firewall or a router. Do I need to explain the difference of Firewall vs a Router?
Probably not, for a person that doesn't know a Google search should be enough. Of course we could get into the discussion about the TYPES of Firewalls as well, that could get fun. Application level, circuit level, basic packet filtering? Bastion host anyone? Using a DMZ is a good idea.

Anyway, I highly doubt the OP will be subject to a DoS attack since there would be little point other than someone being a jerk (DoS are primarily used to disrupt businesses and attack governments). A script kiddie might get a lark over attacking a person that called them a loser in the lunch line or worse, in a HALO game.

And Firewalls most certainly DO stop DoS attacks. But then we're back to the difference between a firewall and a router. The confusion probably stems from the fact that most routers have built in packet filtering firewalls.
post #23 of 30
looks like a south african mega105wr rebrand
all rip off from all
Is manufacturer 2c or belkin?
because mine looks identical to yours
is your gui white and blue?
AzuraChan
(13 items)
 
Haruna
(7 items)
 
 
CPUMotherboardGraphicsRAM
Phenom II x6 1055T Asus M4A88TD-V Evo/Usb3 EVGA GTX460 1GB SC + 9800GT Phsyx 2x2GB Corsair 1333MHZ 
Hard DriveOSMonitorPower
6.8TB Total w7 + ubuntu 19" something Seasonic S12II 520W 
Case
modded antec 902 
CPUGraphicsRAMHard Drive
I7 3630QM GTX660M 2GB + HD4000 8GB 1600Mhz 1TB  
Optical DriveOSCase
Blu Ray thing Win8 64bit Lenovo Y580 
  hide details  
Reply
AzuraChan
(13 items)
 
Haruna
(7 items)
 
 
CPUMotherboardGraphicsRAM
Phenom II x6 1055T Asus M4A88TD-V Evo/Usb3 EVGA GTX460 1GB SC + 9800GT Phsyx 2x2GB Corsair 1333MHZ 
Hard DriveOSMonitorPower
6.8TB Total w7 + ubuntu 19" something Seasonic S12II 520W 
Case
modded antec 902 
CPUGraphicsRAMHard Drive
I7 3630QM GTX660M 2GB + HD4000 8GB 1600Mhz 1TB  
Optical DriveOSCase
Blu Ray thing Win8 64bit Lenovo Y580 
  hide details  
Reply
post #24 of 30
Quote:
Originally Posted by bratas View Post
??? who the hell said a dam thing about the OP is going to be subjected to DDOS because of this call.

This call the OP received is classic phishing so the attacker gets another drone, steal's OP private info and/or a multitude of other things.

Resolution OP
receive call like that tell them to go **** themselves and hang up.
well if I can't break into your home coz of a safedoor steel door called a hardware firewall I might aswell take out my frustration on your bandwidth with DDOS coz I got your IP: Maybe doing so you'll think the firewall has slowed up your connection and remove it again where I can walk right into your home and take what I want. After all I know your IP. It hasn't changed. I can do this till you disappear from my scope by changing your IP. The attacker will then move on
post #25 of 30
Thread Starter 
Quote:
Originally Posted by nukefission View Post
looks like a south african mega105wr rebrand
all rip off from all
Is manufacturer 2c or belkin?
because mine looks identical to yours
is your gui white and blue?
It's a versalink by westell.
Bitfenix Prodigy
(15 items)
 
  
CPUMotherboardGraphicsRAM
Intel Core i7 2600K Asrock Z77E-ITX EVGA GTX 670FTW PNY 16gb 
Hard DriveHard DriveCoolingOS
1TB Hitachi Deskstar Crucial 256GB Coolermaster Hyper TX-3 Windows 10 Pro 
MonitorKeyboardPowerCase
Dell UP2516D Ducky Shine Mini Enermax Revolution XTII Bitfenix Prodigy (White) 
Mouse
Deathadder Black Edition 
  hide details  
Reply
Bitfenix Prodigy
(15 items)
 
  
CPUMotherboardGraphicsRAM
Intel Core i7 2600K Asrock Z77E-ITX EVGA GTX 670FTW PNY 16gb 
Hard DriveHard DriveCoolingOS
1TB Hitachi Deskstar Crucial 256GB Coolermaster Hyper TX-3 Windows 10 Pro 
MonitorKeyboardPowerCase
Dell UP2516D Ducky Shine Mini Enermax Revolution XTII Bitfenix Prodigy (White) 
Mouse
Deathadder Black Edition 
  hide details  
Reply
post #26 of 30
Quote:
Originally Posted by SalisburySteak View Post
It's a versalink by westell.
do you have a static ip?
post #27 of 30
Quote:
Originally Posted by Thumper View Post
Probably not, for a person that doesn't know a Google search should be enough. Of course we could get into the discussion about the TYPES of Firewalls as well, that could get fun. Application level, circuit level, basic packet filtering? Bastion host anyone? Using a DMZ is a good idea.

Anyway, I highly doubt the OP will be subject to a DoS attack since there would be little point other than someone being a jerk (DoS are primarily used to disrupt businesses and attack governments). A script kiddie might get a lark over attacking a person that called them a loser in the lunch line or worse, in a HALO game.

And Firewalls most certainly DO stop DoS attacks. But then we're back to the difference between a firewall and a router. The confusion probably stems from the fact that most routers have built in packet filtering firewalls.
well that's the point of a denail of service. Your firewall blocks it yeah but it eats up your bandwidth. Doing so. Wouldn't have been a denail of service when the firewall didn't bother about.
post #28 of 30
Quote:
Originally Posted by Thumper View Post
You will need to log into the router, for this you will need to enter the router IP address into a web browser. Likely 192.168.1.1, then it will ask for a username and password, if you have not set it up it will be;

username: admin
password: password

This will take you to a command interface where you can secure the wireless connections, I would recommend using a WPA2/AES password. Name your network something unique and the disable the "broadcast" of the SSID. This will make any unauthorized connections extremely unlikely.

That is just the wireless. The best security to protect you from "some indian guy" is to simply not tell him your public IP address and hang up on him.

If you are THAT paranoid you should get and set up a software firewall that you can set strict rules for connections.
This is what you do.

Also, if your paranoid in future, you should consider setting up a PFsence box. IT turns a PC into a router. Grab a old PC, server ,etc and chuck it on, buy a wireless card, and a switch, and your done. Industrial grade protection.

Again, most users don't need that. I have it running on my server because it just sits there doing nothing.

This guys a bit on the slow side, but he explains it.

post #29 of 30
Quote:
Originally Posted by Spooony View Post
well that's the point of a denail of service. Your firewall blocks it yeah but it eats up your bandwidth. Doing so. Wouldn't have been a denail of service when the firewall didn't bother about.
Not quite. Again, the design of a DoS attack is not to cause massive headaches for a home user. DoS are primarily forms of cyber terrorism. the same way a flesh and blood terrorist seeks to kill or maim as many people as possible (they don't kick in a door and kill one person), so to is the purpose of a cyber terrorist. DoS attacks are unleashed against corporations, banks, or governments either to punish them for some real or imagined wrong or for some other "cause". These targets have MASSIVE bandwidth to accommodate users around the world, and a DoS attack is nothing more than requests for data, not large files or packets. Attempting to slow them down by saturating bandwidth with requests is an exercise in futility. Now, the number of requests a SERVER can process is MUCH smaller. Once a connection is made the server can fill the bandwidth with huge files (movies, data files, compressed archives, ect) and then be free to handle new requests. It is in PROCESSING those requests that the DoS attack lies. A firewall configured and designed to foil them (such as a bastion host or application-level firewall) checks the requests before passing them to the server, dropping or rejecting suspicious packets keeping them from reaching the server. Dropping is better than rejecting, since this does not alert the attacking machine to the blocking, it simply has to wait until the request times out and then try again.


What is a denial-of-service (DoS) attack?
In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services.

The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. When you type a URL for a particular website into your browser, you are sending a request to that site's computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can't process your request. This is a "denial of service" because you can't access that site.


SOURCE: http://www.us-cert.gov/cas/tips/ST04-015.html

Another good, easy to understand article;

http://news.cnet.com/2100-1017-236728.html

It is possible for someone to write a DoS script, then sell or give it to someone else, these are called "Script kiddies". They are low level computer users that could never write real code but have delusions of grandeur (or just delusions) and think a DoS script (or virus, or Trojan or any type of attack) just a weapon to wield as they see fit. Make them mad in a chat room or an online game, they will run a script to find your IP, then run their DoS script and sit back and giggle.

This rarely happens, and if it does, you just contact your ISP and request an IP change and explain why.
Edited by Thumper - 4/24/11 at 7:40pm
post #30 of 30
Thread Starter 
Quote:
Originally Posted by Spooony View Post
do you have a static ip?
lol. i just found out that it is.
Bitfenix Prodigy
(15 items)
 
  
CPUMotherboardGraphicsRAM
Intel Core i7 2600K Asrock Z77E-ITX EVGA GTX 670FTW PNY 16gb 
Hard DriveHard DriveCoolingOS
1TB Hitachi Deskstar Crucial 256GB Coolermaster Hyper TX-3 Windows 10 Pro 
MonitorKeyboardPowerCase
Dell UP2516D Ducky Shine Mini Enermax Revolution XTII Bitfenix Prodigy (White) 
Mouse
Deathadder Black Edition 
  hide details  
Reply
Bitfenix Prodigy
(15 items)
 
  
CPUMotherboardGraphicsRAM
Intel Core i7 2600K Asrock Z77E-ITX EVGA GTX 670FTW PNY 16gb 
Hard DriveHard DriveCoolingOS
1TB Hitachi Deskstar Crucial 256GB Coolermaster Hyper TX-3 Windows 10 Pro 
MonitorKeyboardPowerCase
Dell UP2516D Ducky Shine Mini Enermax Revolution XTII Bitfenix Prodigy (White) 
Mouse
Deathadder Black Edition 
  hide details  
Reply
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Networking & Security