Welcome to the FlexRadio Community! Please review the new Community Rules and other important new Community information on the Message Board.
The latest SmartSDR Software:
SmartSDR v4.1.5 | SmartSDR v4.1.5 Release Notes
SmartSDR v3.10.15 | SmartSDR v3.10.15 Release Notes
The latest 4O3A Genius Product Software:
The latest 4O3A Genius Product Software and Firmware
SmartSDR v4.1.5 | SmartSDR v4.1.5 Release Notes
SmartSDR v3.10.15 | SmartSDR v3.10.15 Release Notes
The latest 4O3A Genius Product Software:
The latest 4O3A Genius Product Software and Firmware
How to Receive Technical Support::
If you are needing assistance with FlexRadio products, please refer to the product documentation or check the Help Center for known solutions. Need technical support from FlexRadio? It's as simple as creating a HelpDesk ticket.
If you are needing assistance with FlexRadio products, please refer to the product documentation or check the Help Center for known solutions. Need technical support from FlexRadio? It's as simple as creating a HelpDesk ticket.
Someone was attempting to control my radio
NC7M
Member ✭
While operating the contest I saw an IP address attempting to take over my radio. The IP address started with 139. Did not catch the rest of the numbers. Is there a log I can search some where to find out who this hacker is. I have changed my password to help prevent in the future. What else were they after. Seems like a breach in Flex security. My password is not common. I have a friend who has also experienced this problem recently.
0
Comments
-
“Black hat” hacking used to require sophisticated knowledge of computer operating systems and networking protocols; in contrast, in 2020 an average middle school student can easily download free software that will search the net for vulnerable accounts and then apply various password cracking routines (see reference below). By automating this approach, an average PC coupled with access to the Internet can search tens of thousands of accounts/hour. To avoid detection by law-enforcement, the amateur hacker would use the Tor network to find and download the necessary software, and he or she would then use the Tor network to mount the attack. I do not know whether any software defined transceivers sold by civilian manufacturers run antivirus and anti-malware software but I believe that, as a rule, software defined transceivers rely on the antivirus software residing on the associated PC and on the router provided by an ISP. Hackers look for easy targets to serve as gateways to a network; once inside the network, the hacker can commit fraud, securities theft, blackmail, and identity theft. Software defined transceivers, as a rule, are to be soft targets. The top ten password-cracking techniques used by hackers https://www.itpro.co.uk/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers0
-
change your password. dont share it.0
-
ive been getting a notification in the last couple weeks that xfinity has blocked access to my flex by a malicious ip number. not sure what they could get or if its a way to hack the router0
Leave a Comment
Categories
- All Categories
- 388 Community Topics
- 2.2K New Ideas
- 658 The Flea Market
- 8.4K Software
- 156 SmartSDR+
- 6.5K SmartSDR for Windows
- 186 SmartSDR for Maestro and M models
- 439 SmartSDR for Mac
- 275 SmartSDR for iOS
- 265 SmartSDR CAT
- 204 DAX
- 386 SmartSDR API
- 9.4K Radios and Accessories
- 53 Aurora
- 297 FLEX-8000 Signature Series
- 7.2K FLEX-6000 Signature Series
- 970 Maestro
- 58 FlexControl
- 866 FLEX Series (Legacy) Radios
- 944 Genius Products
- 471 Power Genius XL Amplifier
- 347 Tuner Genius XL
- 126 Antenna Genius
- 306 Shack Infrastructure
- 215 Networking
- 468 Remote Operation (SmartLink)
- 142 Contesting
- 811 Peripherals & Station Integration
- 144 Amateur Radio Interests
- 1.1K Third-Party Software

