Create account

replied 2094d
Hope it's just for testing, lol.

Put these kind of services behind a VPN which supports certification based auth and 2FA.
replied 2094d
It's not a desktop - Windows Server 2016
replied 2094d
No difference. Exposing RDP is one of the top reasons for hacks and ransomware infections.
replied 2094d
That's why it's rate limited now (intrusion detection / prevention system)
replied 2094d
That won't save you from the inevitable and upcoming vulnerabilities... Seriously dude, it is retarded to expose RDP.
replied 2094d
RDP is not a problem - people are a problem. Maybe you've heard

replied 2094d
Not sure what's your point there. It's retarded to expose any services that allow root access (RDP/SSH the same).
replied 2094d
The sudo stuff is an escalation bug. RDP had a long string of serious, remotely exploitable vulnerabilities too.
replied 2094d
Hit up any devops/sysadmin forums and ask what they think about opening a port for RDP without any restriction.
replied 2094d
It is restricted.
replied 2094d
If it was adequately restricted then you wouldn't have any hits like shown on the picture.

I get it tho, you're one of those who can't learn from other people's mistakes. 😂
replied 2094d
That's just what happens if restrictions are temporarily disabled.
replied 2094d
Still idiocy, but i'm ok with that too.
replied 2094d
You're a bit paranoid. And there is no sensitive data on my server, if anything happens I can just reinstall.
replied 2094d
I'm experienced not paranoid. Bot armies are looking for weak servers 0/24 which are being used to attack valuable targets...
replied 2094d
Server 2016 is basically a reskinned windows 10 (you can see the xbox servives and other desktop crap in it).