[EAS] ALERT: EAS Device passwords
David Turnmire
eassbelist at cableone.net
Mon Feb 11 21:37:58 CST 2013
Tom
There is obviously some truth to what you say, but it doesn't change the
reality that one needs basic network security. You can leave out the
word "NAT", as you will have a hard time finding a consumer router that
isn't one. And I venture to say that even most 40+ engineers (says this
55+ engineer) know a bit about that now, as they probably have one on
their home network. Most likely they had one in the case under
discussion, but someone enabled "port forwarding" (or whatever that
vendor calls it) so that they could access the router from offsite. But
in doing so they left it open to the universe.
So what we are really talking here isn't likely about money but about
some combination of security awareness and the skills to configure their
system for better security. Of course, the "simple" way to achieve
security in that case is to forgo the convenience of off-site access and
thus make it largely inaccessible to hackers as well. But giving up
that convenience may have its "costs" as well.
But the bottom line remains the same... if you don't address network
security, you are vulnerable. The rest is just the same challenges we
engineers always have... figuring out how to accomplish our tasks
without enough money or time and sometimes without enough training/skill.
As for passwords... long ago it became apparent to me that there was no
practical way to keep track of all the username/passwords in my head.
So I got a password protected password utility and now I only have to
remember its password and it remembers the rest. I'm sure there are
some free ones out there, but I chose to invest a little ($12?) for one
that provides some additional features I like such as being able to
easily synchronize its database between my office and home computers.
It has a "big brother" for a bit more that allows you to categorize the
passwords so that you can separately maintain "personal" passwords vs
"engineering" passwords vs "IT" passwords, etc.. That way co-workers
can share the relevant databases without compromising their personal
passwords.
Dave
On 2/11/2013 7:11 PM, Tom Taggart wrote:
> All very nice....but many small stations were just able to
> scrape enough together to buy the CAP device. They don't
> have IT guys on staff--they got some kid to get it talking
> to the internet. And most of the staff is 40+ (young folks
> aren't getting into this business) and wouldn't know a NAT
> router if it flew in and bit them. (A nat router--ya mean a
> bug zapper? I have a router in the shop--didn't know you
> were a wood worker?)
>
> Plus my pet peeve: PASSWORDS! Have you every sat down and
> counted the number of devices, web sites, etc. that demand
> passwords? I tried to order some paper topos from USGS
> on-line--and it wouldn't let me until I dredged up what I
> might have used for a password the last time I bought
> something from their site. Which would have been about 5
> years ago. Any wonder that most rational people over the age
> of 30 use Fluffy123 instead of QX456www_pS.44-zxy for a
> password?
>
> __________________________________________________________
> The EAS Forum Discussion List is hosted by the BWWG (Broadcast Warning Working Group). http://eas.radiolists.net
> Please invite your friends to join our Forum! The sign up is at: http://lists.radiolists.net/mailman/listinfo/eas
> ___________________________________________________________
>
More information about the EAS
mailing list