- Joined
- Nov 5, 2018
- Messages
- 2,976
Do people do this anymore? At one time it was a big deal but your ISP would go bonkers if someone reported you. Just asking now because I am putting together a remote access/back up system. I am thinking the more out of the box I think the less vulnerable it would be. It seems like all the exploits these days center around popular programs and their particular settings and rolling my own would be more secure since it would be an unknown.
Hacking seems to be a monkey see/ monkey do exercise. Once an exploit is found people come up with 1000 ways to use it.
I am starting with a 123 backup protocol but the piece about having a cloud backup secure from ransomware is still a problem. Using various ports for incremental backups seems to be one way to hide the data at least from the host machine. The ports would be randomly generated by the host but the only log would exist remotely and w/o that key b/u data would be inaccessible on the Internet.
Just thoughts banging around in my head at this point. From what I have been reading lately you can no longer depend 100% on cloud storage for security or integrity of data.
Man do I long for the days of a tape drive that spit out the tape after a backup of the server.
Hacking seems to be a monkey see/ monkey do exercise. Once an exploit is found people come up with 1000 ways to use it.
I am starting with a 123 backup protocol but the piece about having a cloud backup secure from ransomware is still a problem. Using various ports for incremental backups seems to be one way to hide the data at least from the host machine. The ports would be randomly generated by the host but the only log would exist remotely and w/o that key b/u data would be inaccessible on the Internet.
Just thoughts banging around in my head at this point. From what I have been reading lately you can no longer depend 100% on cloud storage for security or integrity of data.
Man do I long for the days of a tape drive that spit out the tape after a backup of the server.