Jump to content
  • Advertisement
Sign in to follow this  
GhostAce

Text communicator security

This topic is 4867 days old which is more than the 365 day threshold we allow for new replies. Please post a new topic.

If you intended to correct an error in the post then please contact us.

Recommended Posts

Hi, I plan to write a simple text communicator with ability to send and receive files. It is gonna be based on windows sockets. My question is - if I have a firewall (let's say Sygate Personal Firewall) with connections for my communicator set as allowed, is it gonna be a safe application? I mean - is it gonna be a piece of cake to go through for hackers or anything like this? Or do I have to add some magic security code to my communicator? thx for you time

Share this post


Link to post
Share on other sites
Advertisement
It depends.

Usually, it should be ok. The problem happens at the protocol level. (for eg. 1337ers attempting to log of another user by impersonating them, ect.)

Firewalls have ~0 to do with this.

From,
Nice coder

Share this post


Link to post
Share on other sites
firewall doesn't have to do anything with this here because your programs' port is
already open to accept data from the other side anyway. all that a firewall does is to not allowing incoming data to be received by the application on that port.

as nice coder said there shouldn't be too many problems with a simple text messenger. you may want to read up on how to avoid buffer overflows and perhaps stuff like the IRC protocol and irc exploits.

Share this post


Link to post
Share on other sites
I would agree it will probably be ok.
Buffer overflows are the main form of compromising an
open port, but the hack has to be created for every differnt application.
The chances of someone finding your open port and spending the the time to
break your application is slim.....but that doesn't mean it can't be done.

Try using a obscure undefined port...most hackers target well known ports because scanning all the ports is the quick sign of an attacker....
(or if it comes from the same ip an amatuer)
Look up nmap..it should tell you more about port scanners...
if you are paranoid you could download ethereal and log traffic...
it is a good way also to learn about all the traffic that normally goes on in the background

Share this post


Link to post
Share on other sites
Sign in to follow this  

  • Advertisement
×

Important Information

By using GameDev.net, you agree to our community Guidelines, Terms of Use, and Privacy Policy.

We are the game development community.

Whether you are an indie, hobbyist, AAA developer, or just trying to learn, GameDev.net is the place for you to learn, share, and connect with the games industry. Learn more About Us or sign up!

Sign me up!