Reply to post:

Welcome to the Rise of the Machine-to-Machine. Isn't it time to 'block off' some data ducts?

Paul Hovnanian Silver badge

Many years ago (in the last century) I wrote some M2M applications for a company Intranet that used oddball ports. Not initially for security reasons, but to keep various functions logically separated. The added benefit was that our Intranet was pretty well firewalled from the Evil Outside World. All the ports used were blocked, keeping script kiddies (but not internally infected machines) from probing our stuff.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon