Timeline for Connecting to very old Linux OS with ssh
Current License: CC BY-SA 4.0
8 events
when toggle format | what | by | license | comment | |
---|---|---|---|---|---|
Jun 10, 2024 at 7:29 | comment | added | Klaus | It is absolutely clear that outdated software is harmful. But this system is stored on the attic, connected to the local network only on demand and used only to run very outdated old software which we do not have sources from. | |
Jun 9, 2024 at 17:55 | answer | added | PowerLuser | timeline score: 3 | |
Jun 8, 2024 at 13:58 | comment | added | marcelm | Perhaps you already know this, but just in case: those old algorithms have been deprecated because they're considered less secure. If you value security, it's recommended to upgrade that old machine to get access to newer, more secure algorithms. And that's just SSH; that old machine likely has other vulnerabilities in its software, so exposing it to networks (let alone the Internet) carries risk. | |
Jun 7, 2024 at 13:03 | history | became hot network question | |||
Jun 7, 2024 at 7:11 | answer | added | telcoM | timeline score: 19 | |
Jun 7, 2024 at 5:34 | history | edited | G-Man Says 'Reinstate Monica' | CC BY-SA 4.0 |
Fixed formatting; tweaked wording.
|
Jun 7, 2024 at 5:19 | history | edited | Klaus | CC BY-SA 4.0 |
edited body
|
Jun 7, 2024 at 5:03 | history | asked | Klaus | CC BY-SA 4.0 |