Tell us about yourself!

Complete Your Profile
  • How To Make A Raspberry Pi SuperComputer!

    Yea, then you'll be vulnerable to Firewall and NAT evasion techniques (such as Sami Kamkar's NAT pinning) and by extension Arbitrary Code Execution and Traffic Sniffing (in case you authenticate with Telnet which is unencrypted). Telnet needed to stay dead in the 70's when it was created. Go with SSH or better yet create a VPN on a controller box with decent quality encryption algorithm and key length and a thorough and restrictive firewall. Don't ever install a service that doesn't care about your security or you will have people farming out your resources for password cracking/mining or a botnet.

    View Instructable »