Changes

no edit summary
Line 37: Line 37:  
       <td>HTTPS Attack Prevention</td>
 
       <td>HTTPS Attack Prevention</td>
 
       <td>Off</td>
 
       <td>Off</td>
       <td>HyperText Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td>
+
       <td>Hypertext Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
Line 137: Line 137:  
       <td>Root CA</td>
 
       <td>Root CA</td>
 
       <td>Pre-uplouded</td>
 
       <td>Pre-uplouded</td>
<td>Root CA certificate are only needed if you want to use HTTPS for your services. There is a default file already preloaded in this device which will be overwriten by any uploaded file.</td>
+
<td>Root CA certificate are only needed if you want to use HTTPS for your services. There is a default file already preloaded in this device which will be overwritten by any uploaded file.</td>
 
     </tr>
 
     </tr>
 
       <td>Universal Plug and Play</td>
 
       <td>Universal Plug and Play</td>
Line 144: Line 144:  
<td>UPnP doesn't require any sort of authentication from the user. Any application running on your computer in LAN  can ask the router to forward a port over UPnP, which is why the malware can abuse UPnP. Recommendation - If you don’t use it when leave it not installed or turned off.</td>
 
<td>UPnP doesn't require any sort of authentication from the user. Any application running on your computer in LAN  can ask the router to forward a port over UPnP, which is why the malware can abuse UPnP. Recommendation - If you don’t use it when leave it not installed or turned off.</td>
 
     </tr>
 
     </tr>
       <td>Universal Asynchronous Receiver – Transmiter</td>
+
       <td>Universal Asynchronous Receiver – Transmitter</td>
 
       <td>UART</td>
 
       <td>UART</td>
 
       <td> By router admin password</td>
 
       <td> By router admin password</td>
Line 195: Line 195:  
     <tr>
 
     <tr>
 
       <td>Separate clients</td>
 
       <td>Separate clients</td>
       <td>Separate clients also known as wireless client isolation is a security feature that prevents wireless clients from communicating with one another. This feature adds aditional level of security to limit attacks and threats between devices connected to the wireless networks.</td>
+
       <td>Separate clients also known as wireless client isolation is a security feature that prevents wireless clients from communicating with one another. This feature adds additional level of security to limit attacks and threats between devices connected to the wireless networks.</td>
 
     </tr>  
 
     </tr>  
 
     <tr>
 
     <tr>
Line 233: Line 233:     
*Security fixes;
 
*Security fixes;
*Perfomance enchancements;
+
*Performance enhancements;
 
*Visual updates;
 
*Visual updates;
 
So where is no reason why you shouldn't update firmware.</td>
 
So where is no reason why you shouldn't update firmware.</td>
Line 295: Line 295:  
       <td>HTTPS Attack Prevention</td>
 
       <td>HTTPS Attack Prevention</td>
 
       <td>Off</td>
 
       <td>Off</td>
       <td>HyperText Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td>
+
       <td>Hypertext Transfer Protocol Secure (HTTPS) flood attack is same as HTTP flood attack but using HTTPS protocol instead of simple HTTP</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
0

edits