Welcome to the FlexRadio Community! Please review the new Community Rules and other important new Community information on the Message Board.
Need the latest SmartSDR or 4O3A Genius Product Software?
SmartSDR v4.1.5 | SmartSDR v4.1.5 Release Notes
SmartSDR v3.10.15 | SmartSDR v3.10.15 Release Notes
The latest 4O3A Genius Product Software and Firmware
SmartSDR v4.1.5 | SmartSDR v4.1.5 Release Notes
SmartSDR v3.10.15 | SmartSDR v3.10.15 Release Notes
The latest 4O3A Genius Product Software and Firmware
If you are having a problem, please refer to the product documentation or check the Help Center for known solutions.
Need technical support from FlexRadio? It's as simple as Creating a HelpDesk ticket.
Need technical support from FlexRadio? It's as simple as Creating a HelpDesk ticket.
Someone was attempting to control my radio
NC7M
Member ✭
While operating the contest I saw an IP address attempting to take over my radio. The IP address started with 139. Did not catch the rest of the numbers. Is there a log I can search some where to find out who this hacker is. I have changed my password to help prevent in the future. What else were they after. Seems like a breach in Flex security. My password is not common. I have a friend who has also experienced this problem recently.
0
Comments
-
“Black hat” hacking used to require sophisticated knowledge of computer operating systems and networking protocols; in contrast, in 2020 an average middle school student can easily download free software that will search the net for vulnerable accounts and then apply various password cracking routines (see reference below). By automating this approach, an average PC coupled with access to the Internet can search tens of thousands of accounts/hour. To avoid detection by law-enforcement, the amateur hacker would use the Tor network to find and download the necessary software, and he or she would then use the Tor network to mount the attack. I do not know whether any software defined transceivers sold by civilian manufacturers run antivirus and anti-malware software but I believe that, as a rule, software defined transceivers rely on the antivirus software residing on the associated PC and on the router provided by an ISP. Hackers look for easy targets to serve as gateways to a network; once inside the network, the hacker can commit fraud, securities theft, blackmail, and identity theft. Software defined transceivers, as a rule, are to be soft targets. The top ten password-cracking techniques used by hackers https://www.itpro.co.uk/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers0
-
change your password. dont share it.0
-
ive been getting a notification in the last couple weeks that xfinity has blocked access to my flex by a malicious ip number. not sure what they could get or if its a way to hack the router0
Leave a Comment
Categories
- All Categories
- 381 Community Topics
- 2.1K New Ideas
- 637 The Flea Market
- 8.3K Software
- 144 SmartSDR+
- 6.4K SmartSDR for Windows
- 188 SmartSDR for Maestro and M models
- 433 SmartSDR for Mac
- 272 SmartSDR for iOS
- 261 SmartSDR CAT
- 200 DAX
- 383 SmartSDR API
- 9.4K Radios and Accessories
- 47 Aurora
- 274 FLEX-8000 Signature Series
- 7.2K FLEX-6000 Signature Series
- 958 Maestro
- 57 FlexControl
- 866 FLEX Series (Legacy) Radios
- 932 Genius Products
- 466 Power Genius XL Amplifier
- 340 Tuner Genius XL
- 126 Antenna Genius
- 303 Shack Infrastructure
- 213 Networking
- 464 Remote Operation (SmartLink)
- 144 Contesting
- 794 Peripherals & Station Integration
- 141 Amateur Radio Interests
- 1K Third-Party Software

