by PMC » Mon Apr 14, 2014 8:32 pm
Perhaps I should post some IP addresses of known servers that go looking for holes... these scumbags troll the network using a collection of server machines, and do what is called a slow port scan. A port is used to transmit/receive with. When they find one that is open, then they look to see what can be done with it. This unwanted traffic is a daily occurance, and anybody with an internet connection can monitor these rogue servers. Most companies don't even turn this ability on, when their running software can track the connection attempts. Tracking these things and providing the tracking logs to your ISP's security department can be useful in shutting them down. If one hundred people complain rather than one person, the ISP gets an idea of what is happening.
The only way to guarantee any kind of secure connection is to use a `callback' design. The user logs in with a username and password, and then the receiving server decides to call back the connection after verification. This can't be done with a web browser because web browsers only work in one direction, and don't maintain a fixed connection. This callback concept is not perfect because someone with enough tech insider knowledge could get around it, but it is 99% better than what is being used now.