n00b question

MDme

Senior member
Aug 27, 2004
297
0
0
I have a wireless router with SPI and NAT enabled. If I set the port forwarding options for my router to forward ports XXXX to my pc for use with bit torrent, will it enable hackers to hack me through the forwarded ports??

I am asking this coz I taught that port forwarding adds security to your system because the network address is hidden behind the firewall/router.

Answers appreciated. Thanks guys.
 

JackMDS

Elite Member
Super Moderator
Oct 25, 1999
29,563
432
126
Yeah Network behind a Router is more secure.

But if you it needed to be connected from the outside, depending on the application, a port(s) have to be open.

So now the Network is less secured coz the port and the appication behind it are exposed to the outside.

However that is what "Life in the Fast Lane" is all about you have to make a choice.

More here, Cable/DSL Routers - NAT, Ports, SPI.

:sun:
 

MDme

Senior member
Aug 27, 2004
297
0
0
okay then. so my current set up (when i use bittorrent) is to forward the ports that bt uses. i also have zone alarm as a software firewall set up. i then set up permissions in zone alarm to allow bittorrent to accept inbound connections from the internet through the ports. is it right for me to think that only legitimate traffic (bittorrent peers) will be accepted by bittorrent through the open ports?? is it possible for a hacker to send data or do malicious things (install software, etc...) to me through the open ports?

Thanks again Jack.

 

JackMDS

Elite Member
Super Moderator
Oct 25, 1999
29,563
432
126
Here is the Official story.

http://www.securityfocus.com/news/11248

Let be practical, as you know hundreds of thousands of people are using applications that need open ports. Did you hear that they losing their systems to Hacking?

To be on the safe side I do not keep sensitive information on computers that have ports open to the Internet, unless it involve traffic that is encrypted and with very strong passwords.

:sun:
 

nweaver

Diamond Member
Jan 21, 2001
6,813
1
0
depends on S/W listening. Can I send malformed packets and overflow the buffers, or get shell access? Can I upload/execute code remotely, etc. Another important thing is to NOT RUN AS ADMIN all the time. If you run as admin, the program runs with admin privilages...and then

ALL YOUR BASE ARE BELONG TO US!