M
Mike
Hi Bill,
I have a question that I'd appreciate your clarifying for me. As you know
from our newsgroup exchanges, I use remote desktop (daily). To be
specific, I use the remote desktop web connection to connect from my laptop
(wherever I may happen to be) to my winxp pro machine.
My question is security related. My xppro box runs behind a firewall router
(netgear rp614). I have it forwarding port 3389. Comment you made in
response to others indicated that you did not think using port 80 for http
was such a hot idea. So, I have forwarded port 80 thru my firewall to port
'xxxx'. Everything works great. And to make sure I'm explaining myself
clearly, to logon to my xppro box, i enter "http://myxp ip
address:xxxx/tsweb
and go from there. I do not run a software firewall
(either xp pro's or zone alarm) primarily because netgear advises against
it. My log on password is a highly secure password. Ok...so am I pretty
well protected?
The reason I ask is because I do not fully understand what I have gained
from moving my http listening from port 80 to port xxxx. I guess I'd need
to be a hacker to understand what a hacker tries to do to gain access to my
system...but I'm guessing they scan blocks of ip addresses looking for open
port 80. So...even if they had found my open port 80 before I forwarded it,
they'd still need to break my password. (right?????) But if that's so,
then wouldn't they merely need to scan other (perhaps higher numbered) ports
to accomplish
the same thing?
Secondly, (I appreciate your patience if you're still with me...your many
contributions in the newsgroup indicate you are very patient) I do not
fully grasp VPN/tunneling as it relates to remote desktop web connection.
Am I already doing this? I don't think so....since I didn't go thru the
process
of setting up a VPN connection. Do I need to? What would I gain?
Would appreciate any answers to my questions, and clarifications to the
areas I'm obviously fuzzy in.
Thanks.
I have a question that I'd appreciate your clarifying for me. As you know
from our newsgroup exchanges, I use remote desktop (daily). To be
specific, I use the remote desktop web connection to connect from my laptop
(wherever I may happen to be) to my winxp pro machine.
My question is security related. My xppro box runs behind a firewall router
(netgear rp614). I have it forwarding port 3389. Comment you made in
response to others indicated that you did not think using port 80 for http
was such a hot idea. So, I have forwarded port 80 thru my firewall to port
'xxxx'. Everything works great. And to make sure I'm explaining myself
clearly, to logon to my xppro box, i enter "http://myxp ip
address:xxxx/tsweb
and go from there. I do not run a software firewall
(either xp pro's or zone alarm) primarily because netgear advises against
it. My log on password is a highly secure password. Ok...so am I pretty
well protected?
The reason I ask is because I do not fully understand what I have gained
from moving my http listening from port 80 to port xxxx. I guess I'd need
to be a hacker to understand what a hacker tries to do to gain access to my
system...but I'm guessing they scan blocks of ip addresses looking for open
port 80. So...even if they had found my open port 80 before I forwarded it,
they'd still need to break my password. (right?????) But if that's so,
then wouldn't they merely need to scan other (perhaps higher numbered) ports
to accomplish
the same thing?
Secondly, (I appreciate your patience if you're still with me...your many
contributions in the newsgroup indicate you are very patient) I do not
fully grasp VPN/tunneling as it relates to remote desktop web connection.
Am I already doing this? I don't think so....since I didn't go thru the
process
of setting up a VPN connection. Do I need to? What would I gain?
Would appreciate any answers to my questions, and clarifications to the
areas I'm obviously fuzzy in.
Thanks.