![]() |
Jellyfin foz Android TV - Unable to connect - Printable Version +- Jellyfin Forum (https://forum.jellyfin.org) +-- Forum: Support (https://forum.jellyfin.org/f-support) +--- Forum: Troubleshooting (https://forum.jellyfin.org/f-troubleshooting) +--- Thread: Jellyfin foz Android TV - Unable to connect (/t-jellyfin-foz-android-tv-unable-to-connect) Pages:
1
2
|
RE: Jellyfin foz Android TV - Unable to connect - TheDreadPirate - 2025-02-21 The rando port scans are not going to find NEW software vulnerabilities. They're looking for old, unpatched systems. The kind of hacker that has the expertise and resources to find and exploit new vulnerabilities doesn't care about somebody's Jellyfin server. They're going to hack a mega corp and extort them for millions. By the time this new exploit trickles down to script kiddies, the folks doing rando port scans, the exploit has long been patched. As long as you patch frequently, this isn't an issue to worry about. RE: Jellyfin foz Android TV - Unable to connect - shadow82 - 2025-02-22 Human hacker maybe not, but AI scanning, finding vulnerabilities which is next writing and executing new created code - yes. This is automated way to find and exploit PCs in Internet as zombies for DDoS attacks or other activities, like scanning deeper the LAN server lives in. It's not year 2000 anymore ![]() Other thing is that unprotected server is a subject to inject any malicious code when connecting to it freely without any antimalware scanner up and running That's why I use NGFW that scans data in motion - on the fly - with WAF, IPS & antimalware, so malicious user won't do SQL injection, cross-site scripting (XSS), and code injection through user input fields. |