Putting a Windows 98 machine on a switch

Posted on 2006-04-27
Last Modified: 2013-12-04
I have a Windows 98 SE system.  I want to put a timer program on their for employees to login.  It is going to be hooked into a switch that is on a 2003 Small Business Server network.  I am obviously not going to join it to the network.  The network is behind a 3com office connect.  I am going to use the 3com and block it's ip from leaving.  It will be statically set.  The only thing this machine will be used for is that timer program.  I will have antivirus and it will stay on all the time and just be used to house the timer program on.  Does this hurt security in any way or anyone see any problems with doing this.  Any cons to this at all?
Question by:americanmobile
    LVL 4

    Accepted Solution

    My opinion is to setup a firewall (Sygate personal firewall is a free and good solution ) on that 98 pc and close all ports, except the one that you need in order the timer program to work.
    Also, antivirus as you sayed and all the windows updates.

    Remove all the Internet explorer icons ( Desktop, Start Menu etc ) and install Firefox just in case anyone wants to surf one the internet from that machine. And make firefox the default browser.

    I think with the above you will be safe.
    LVL 1

    Expert Comment

    well closing all port of installing firewall of such thing only can protect him from internet hack, but security isn't always protecting you form internet.

    First of all, let's see the question, original poster want to secure a machine from other computer to access it from network (I think that's what closing port and installing firewall means). ok so he want to secure it, then there should be some special thing in that machine which he want to protect and what is that, that's the record of that timer program. so he also have to look at what application he using, are there any way to compromise the timer software to gain access to edit record.

    I'm may be totally wrong.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    First let me explain that I am extremely paranoid about computer security issues and computer backup issues.  This means that I only feel safe if I am running unknown programs and visiting unknown sites in a virtual machine.  In that way, if anythin…
    In a recent article here at Experts Exchange (, I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…
    Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now