And once agian why Password security and closeing unused ports is your
first line in defense against getting Pwned

"Attack vectors are primarily TELNET or SSH that listen on the
device's WAN interface, accepting weak passwords (such as admin)."
---------------------------------------------------
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss

Reply via email to