Abuse Melding

Je hebt een klacht over de onderstaande posting:

03-01-2015, 10:22 door Fwiffo

Door Anoniem: Overigens kun je door het toevoegen van een restrict default noquery lijn in je ntpd.conf de referentie-ntpd zodanig dichttimmeren dat het ook ongepatch weer meekan. Dit begreep ik ook al uit een draadje op macrumors over ntpd: http://forums.macrumors.com/showpost.php?p=20519925&postcount=169No website visit is necessary. Just being "on the Internet" with an open, vulnerable port exposed is enough. Hackers scan all Internet connected devices regularly looking for the ports that have holes. It is not really as bad as that, though. Of the six vulnerabilities that were discovered, five of them can be mitigated without any patching by simply having restrict......noquery in the ntp configuration file, which Macs have had as a default even back to Snow Leopard. The sixth vulnerability involves using cryptographic techniques for secure communication between ntp machines, which requires the user to have modified the default configuration on OS X for this purpose. I doubt this affects many Mac ...

Beschrijf je klacht (Optioneel):

captcha