Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Is my Machine open to hackers

Posted on 2016-07-27
Medium Priority
Last Modified: 2016-07-28
I have managed to open my desktop using Port Forwarding Settings of my Router using this link

Port Forwarding

How safe is my machine ? Is my Machine open to hackers ?

I have CGI applications running on my desktop. These I need to show Demos to my prospective customers accessing thru my Mobile.
Question by:Allan_Fernandes
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
LVL 49

Expert Comment

by:Jackie Man
ID: 41732391
Are you doing a port forwarding of the RDP port 3389 to do a remote desktop connection to your computer?

Author Comment

ID: 41732464
My CGI Application on my home desktop is a REST server and my REST Client applications are Native APK / Exe etc.
They are communicating from a port other than 80.
LVL 49

Accepted Solution

Jackie Man earned 2000 total points
ID: 41732569
REST services is convenient to use but it has the security risk of session hijacking and cross-site request forgery (XSRF).

Source: https://www.toptal.com/java/rest-security-with-jwt-spring-security-and-java

Anyway, if your use scenario is not for production environment as it is just a demo, I do not see any critical issues for security concerns.

After all, just make sure that you have set a proper user permission for the folder and the content for storing the CGI applications in a way that the user credential for accessing your CGI applications is not a local admin of your machine, you will be fine.

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question