ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

PROTECT YOUR RDP/VPS


  • Please log in to reply
PROTECT YOUR RDP/VPS

#1

Aiyden
Aiyden
    Offline
    77
    Rep
    23
    Likes

    Addicted

Posts: 163
Threads: 29
Joined: Jun 04, 2019
Credits: 0

Five years registered
#1

Hi all. 

I'm just here to inform you of the safety risks that not many people recognize when buying and using an RDP or VPS. Especially when buying from a less-reputable source.

However even buying from reputable sources leaves you open to potential exit-scams. 

 

You are literally buying access to a computer that's not yours. Many people store high value information, accounts and bitcoin and even worse they leave it open 24/7. It's stupid and reckless and you should be more aware of your security. The fun thing is that they use the RDP from the beginning because they want to up their security (& anonymity ofc) but then leave a completely new and fragile system there to be targeted. 

 

I've found a program that makes your RDP BULLETPROOF, even from local administrators. You can block any connections made trying to access your RDP, filter it by country, allow no connections at all except yourself, and deny bruteforces. You can manage working hours, ip addresses, permissions etc. 

 

Here is the first thing I saw when i tried this out on one of the RDP's i bought of one of the main RDP sellers here on the forums. 

 

0950ff55f4aa596c827b545f1b8c0efa.png

 

 

The program is called RDS-Knight and you can find the official page here -

Please Login or Register to see this Hidden Content

 

It comes with a 15 days free trial and is priced at $50 PER SERVER using the Security Essentials and the Ultimate package being $250 A server. Would be great if we had some member of the community expertising in cracks that can get us the newest version of the ultimate package. 

 

There are cracked versions out there but to my knowledge only older versions. Be aware of malware and do your research.

 

 

 

// I've looked through the forums a bit and didn't find anything related to this. Hopefully it hasn't been posted before and is something new that you all can take advantage of. //


  • 1

#2

LikeASir
LikeASir
    Offline
    179
    Rep
    515
    Likes

Posts: 907
Threads: 134
Joined: Oct 30, 2019
Credits: 0

Five years registered
#2

Yeah, it's true I also suggest to change the ssh port and the rdp connection ones, maybe they can find it with a port scan but using services like Fail2ban will help a lot


  • 0


 Users browsing this thread: and 1 guests