With Instructables you can share what you make with the world, and tap into an ever-growing community of creative experts.
Tell us about yourself!
Yea, then you'll be vulnerable to Firewall and NAT evasion techniques (such as Sami Kamkar's NAT pinning) and by extension Arbitrary Code Execution and Traffic Sniffing (in case you authenticate with Telnet which is unencrypted). Telnet needed to stay dead in the 70's when it was created. Go with SSH or better yet create a VPN on a controller box with decent quality encryption algorithm and key length and a thorough and restrictive firewall. Don't ever install a service that doesn't care about your security or you will have people farming out your resources for password cracking/mining or a botnet.
Join 2 million + to receive instant DIY inspiration in your inbox.
© 2016 Autodesk, Inc.