I have vrizn fis and it has a supplied router to translate between the fis and rj45/IP. I noticed when I logged onto my vrizn account in my browser that they had unrestricted access to my router (well, their router, actually) including my WPA2 SSID and passphrase. Anyone who could gain access to vrizn’s records has full access to my wifi/LAN. I’m not terribly savvy, so this has got to be only the tip of a huge iceberg.
So I bought another router, made it’s local IP something other than 192.168.., left DHCP on the V router (still at 192.168..), and now I have a new private LAN. Rebooting OP 12.3 x64 seemed to pick this up. I port-forwarded HTTP and HTTPS on the V router. I guess that’s all I need (are there separate ports for curl and that other linux network “get” program - is it wget?) - does this seem a reasonable way to secure my network?
The russian issue is big: Malware RATs can steal your data and your money, your privacy too _ ESET ThreatBlog.mp4
…but again, probably only the tip of an iceberg or three. (that’s just the only one I know about)
Suggestions please - should I turn these on?
Block Anonymous Internet Requests
Filter Multicast
Filter Internet NAT Redirection
I don’t plan on doing any remote administration, just wget/curl, HTTP, FTP, HTTPS, and maybe a game (UT2004 in Windows xp) so I should block all ports, drop all pings, yes?
TIA!!! Patricia