tag:blogger.com,1999:blog-143925273655347334.post291125028800680213..comments2024-03-27T07:30:02.390+00:00Comments on drsolly: Finding out your PINdrsollyhttp://www.blogger.com/profile/15954188290191548178noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-143925273655347334.post-40612456475500919142013-09-17T13:26:05.945+01:002013-09-17T13:26:05.945+01:00Well Dr., thanks for such a full reply. I see you ...Well Dr., thanks for such a full reply. I see you did indeed blog a blog...<br /><br />Arh, Good ole Raspberry Pi. Indeed that is the route of all this. I have been trying to set up the Pi to act as a server for the current game craze of Minecraft!. Following a blog posting on Raspberrypi.org, about setting up a pi to act as a server for this game, I tried to emulate this idea. However, my pi didnt seem to run very well, so as part of my reserach and education, I set the "main " computer up to test my "serving" capabilities. On the big machine the system coped very well, I could either access it via its IP address, after forward porting my router, or I could, with a little help from a site called no-ip.com and a redirection of a web site of mine, have a dedicated named address. <br /><br />So now i just need to tweak the pi, including the server program to get the memory usage low enough to handle the demand from game hungry kids!!Ruritanianministerofstatehttp://drsollysothereader.comnoreply@blogger.comtag:blogger.com,1999:blog-143925273655347334.post-89836377704204604502013-09-16T18:58:19.354+01:002013-09-16T18:58:19.354+01:00The leg's going well, thanks.
I don't rea...The leg's going well, thanks.<br /><br />I don't really know why Linux seems to be more secure than Windows. I have a few guesses.<br /><br />1) There's a lot more Windows computers, so it's a more fruitful target.<br />2) Linux users are probably a bit more clueful than the average. Computers tend to come with Windows pre-installed, so if you're running Linux, you chose to install it yourself.<br />3) When I'm using Linux, I'm not using it as "root", that is, with ultimate privilege. Whereas I suspect that a Lot of Windows users are running as root (or "admin").<br /><br />It won't go to court. What happens is, you suddenly discover that a chunk of money has vanished. And it's gone from accounts that you did indeed set up, and put money into, but that money isn't there any more. So where is it? Maybe you used Western Union to send it to someone in Ruritania. Or someone did, pretending to be you. So who will you take to court?<br /><br />If you're using your computer as a server, then A) you might try to configure your router to act as a firewall, B) you might think about whether you can restrict who (which IP addresses) have access to that server, and C) which services your computer is offering to the whole world and wether you can tighten that up and D) think about whether you might use a different computer to be the server. If you don't have a spare computer currently doing nothing, you can get a Raspberry Pi for £20 and that makes a fine server.<br /><br />But I think most time when your computer becomes a slave to someone else, it happened because you ran something that was emailed to you, or because you accessed a web site that had auto-installing malware on it.<br /><br />The one time that happened to me ... I feel a blog coming on ...drsollyhttps://www.blogger.com/profile/15954188290191548178noreply@blogger.comtag:blogger.com,1999:blog-143925273655347334.post-86041634077594939752013-09-16T16:45:33.851+01:002013-09-16T16:45:33.851+01:00Actually, A question please Dr. Alan,
Is Linux, ...Actually, A question please Dr. Alan, <br /><br />Is Linux, more secure for online stuff than windows.<br /><br />I'm guessing all prog's are as "easy" to hack or virus attack as each other, except as windows based stuff is so prevalent in the market it is targeted more?<br /><br />I do online banking but only from home although, another matter I must look at now is that I have set up my computer to act as a server from time to time so one of the ports is “not monitored” by the talk talk firewall.<br /> <br />Anyway, my very flimsy, but still to be tested, defence of identity fraud, is a simple matter of fact. “I did not set up these accounts, and as such they cannot be “my” accounts!” I will let you know how I get on in court, if anyone ever thieves my identity!<br /><br />Finally I guess the biggest friend of all this is, complacency, as we all get used to doing things our way and don’t think about what could go wrong, even when we read about it online and in emails!! <br /><br />Well, rest your leg well, and I look forward to many more posts in the future.<br /><br />:)<br />hidinginhyperspacehttp://itsnotmedot.comnoreply@blogger.com