• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Any validity to this

If your pc's are behind a router and access the internet through it, you probably don't have much to worry about as long as you are patched to the latest and greatest...
 
I don't think it's a big deal to have it enabled on a PC - apart from the big vulnerabilities in 2001, I don't recall hearing of any other attacks. What I would do is make sure it's disabled on the router. UPnP, in the name of convenience, can ask your router to open and forward ports for you, without any manual intervention or approval on your part. Personally, I don't want any software making those decisions. While I've never heard of such thing in practice, it should be possible for a sufficiently sophisticated attacker or worm that's compromised a PC to forward further network ports so that your PC could be accessed even behind a NAT router.
 
Modular, upnp can be useful, but is more often a problem. It causes random troubles that magically go away when you disable it on everything and configure things statically. It's a bad protocol.

Look at Apple's Bonjour for a workalike that works.

Gibson's advice is based on security holes in the Windows upnp client years ago. If you are up to date on Windows patches that's long since a non-issue, and if you aren't up to date on Windows patches you've left the barn door wide open anyway and upnp is the least of your worries.
 
Back
Top