Subj : Re: Web hosting To : Andre From : McDoob Date : Fri Mar 18 2022 12:15:17 An> Mc> How so, when you can literally reach out and unplug the server during An> Mc> attack or breach? An> An> That assumes: An> An> 1. You know there's a breach. An> 2. You figured it out before lateral movement. An> An> It is so because there's nothing on the hosting company's network I care An> about. The same is not true of my home network. Heh. Fair enough. (o_-) An> And that's **my** network. I doubt most sysops have an inbound IPS, a An> honeypot on the server VLAN, and a firewall that will actively block on An> bad traffic from either those. I don't want to shoot you down on this, because there are some truly insecure home networks out there. However, most routers that are on the market these days have the features you're talking about, and often enabled by default. At the very least, the router would have a firewall that blocks any traffic on ports that aren't specifically opened, and any server operator with a brain would have a firewall built directly into the server (ie fail2ban for Linux). I mean, it really is up to the server's 'owner'. I am forced to use quotes there, since a hosted server is owned by the host, not the person actually making use of the server. Ease of use, and available features (including security), are very valid reasons to choose a hosted rather than home server. I had only suggested it as a very cost-effective alternative. McDoob SysOp, PiBBS pibbs.sytes.net --- Mystic BBS v1.12 A46 2020/08/26 (Raspberry Pi/32) * Origin: PiBBS (21:4/135) .