• Content count

  • Joined

  • Last visited


  • check
    Agree 74
  • info_outline
    Informative 24
  • tag_faces
    Funny 8
  • thumb_up
    Thumbs Up 60
  • thumb_up
    Likes (Old) 0


This user doesn't have any awards


About Windows7ge

  • Title
  • Birthday


  • CPU
    5960X O.C. 4.5GHz
  • Motherboard
  • RAM
    64GB G.Skill Ripjaws4 2400MHz O.C. 2666MHz
  • GPU
    2x Sapphire Tri-X R9 290X CFX
  • Case
    None, custom built wall PC
  • Storage
    Intel 750 Series 400GB PCI_e SSD/2x3TB WD Reds in RAID0
  • PSU
    Corsair AX1200i
  • Cooling
    XSPC Waterblocks on CPU/Both GPU's 2x 480mm radiators with Noctua NF-F12 Fans

Profile Information

  • Gender
  • Location
    New York
  • Interests
    Building custom computers
    Custom water cooling
    Computer networking

Recent Profile Visitors

677 profile views
  1. Well thank you for all the helpful information. Your analogies also make it easier to understand. I'm going to setup a test rig to see if I can make it work and if I do manage to get it working I'll set up a low power dedicated Mini-ITX system.
  2. Things can get out of hand quickly when alcohol is involved.
  3. If I can use a normal web browser and the encryption operates at a level higher than the standard protocols (HTTP/HTTPS) then I'm to assume I'll get the normal warning "Your connection isn't private" when in reality it will be but the browser doesn't know that to tell me. Makes sense but I might like to ask if I wanted to configure it as a legitimate VPN Proxy (when I'm not home, but I don't plan to do this) and I sent all my internet communications through it before redirecting it to a server somewhere else like Google, Youtube , or the forum then all my general internet traffic could be the cost of probably noticeably higher latency and worse download speeds.
  4. Does this require any special application or will a web browser such as Mozilla Firefox or Chrome support the encryption algorithm to encrypt and decrypt the communications?
  5. So simply put regardless of what protocols I'm using it'll all get encrypted during the session? If this is true I have a greater more difficult (in my opinion more difficult) question. The IPMI for the ASRock server motherboards allow remote desktop sessions using (to my knowledge) Java based software called jviewer. I know Java isn't renound for their security and the jviewer uses its own port numbers for keyboard/mouse/monitor controls. How can I tell if the jviewer session is encrypted? Or because of this "VPN tunnel" does it not matter? All traffic going through the VPN server is encrypted regardless?" If there's no serious explained objections I plan to try out Sophos XG Home Edition first and see how it works. If I can't get it working in my exact application then I'll try OpenVPN and see if it makes a difference.
  6. As someone previously mentioned I'm going to build a VPN server and put it in between the router and the server MNGT port. If it works then great if not then I'm out of luck.
  7. Even though I'm a default Chrome user due to college things and Chrome ditching Java support I have both Mozilla Firefox and Chrome installed on my desktop & laptop so if I locate this Firefox setting I can use Firefox when remoting into the servers IPMI I liked your analogy, besides being informative and easy to understand I also found it amusing. This raises another question though. After setting up the VPN if it's going to force me to use HTTP won't that defeat the whole purpose of it? Or in the background unbenounced to me will it use its own method of encryption? Besides the Firefox over-ride if I can figure that out.
  8. That'll be my backup plan but for right now educating myself on VPNs seems like a good idea. I'm young and I've chosen a profession in the technical field so I can use this as a learning opportunity.
  9. That's another option if things don't turn out as well as I hope. Correct me if I'm wrong but I don't think team viewer encrypts sessions though.
  10. Well alright, I think I have all the hardware necessary for a mini-vpn server. It'd also be a good learning experience. Thank you for the help. I don't plan on making it complicated so I'll look into Sophos XG Home Edition first and see how it works for my application. I see why you said a VPN server is "kind of" a proxy. It's not a very good proxy when it's on the same private network as the server you want to access.
  11. So I imagine I'd open a router port. Point it to the VPN server. Then from the VPN server I'd authenticate in some manor and if configured how I want it it'll point me to the IPMI of my main server? Would the VPN server provide encryption?
  12. Looking at my own router nothing says VPN server so that's not an option. I do have a very low power Mini-ITX server motherboard that I could slap a system together using. I've never built a VPN server. Is it like a proxy?
  13. I brushed through an article and it quite quickly shut down my desire to use the IPMI over the internet...this sucks, the IPMI is so useful and cool. Why isn't the security up to date enough to let us use it over the internet without worry? I'd say a lot of the IPMI's purpose is defeated if it can't securely be used remotely. If you're on location then it's just a leisure to not have to get out of your chair to physically look at the server while remote access could be a seriously useful tool if nobody on location knows how to fix the server.
  14. I figured as much. Using the SSH though that'd only give me control in the OS. RDP in Windows respectively but if windows was running, froze, and I wanted to access my file server on FreeBSD. I couldn't do anything while remote. The IPMI would let me recover the system without having to physically be there. I haven't the knowledge to do that. I know what a VPN is but to setup a server dedicated as one I wouldn't know where to start. I figured it might not if I start up a desktop session using jviewer. I get the feeling it's not encrypted. I don't fully understand certificates so I'm not going to try and buy one but I don't know how to add one either.
  15. A few weeks ago I bought the ASRock EP2C602-4L/D16 Server Motherboard. Nice board, lots of I/O. I want to be able to remote manage it over the internet because I want to use it as a dual boot system. (FreeBSD for a strong file server, Windows 7 64-Bit just so I can screw around with a heap ton of resources (16 cores, 32 threads, 128GB of RAM, currently 9TB of storage space will be upgrading to 25TB relatively soon) Anyways getting side tracked. I know it's very bad to have a completely unsecured everything sent in plain text session over the internet. The motherboard has built-in IPMI with the ability to remote desktop the server. I could just open a port on my router point it at the IPMI and boom, done, manage the server at a hardware level from almost anywhere in the world...No security though. I learned that the IPMI has the option to configure SSL Certificates which (to my knowledge) are required to encrypt web sessions and allow you to use HTTPS (port 443). This certificate wants information that I don't know how to configure: Common Name(CN): Organization(O): Organization Unit(OU): City or Locality(L): State or Province(ST): Country(C): Email Address: Valid for: (Input number of days) Days Key Length: 512 or 1024 bits About 50% of this I understand and can fill out but even if I fill in the spaces I don't understand trying to access the server via HTTPS it tells me insecure site and that the certificate was signed by the site itself...not entirely sure what that means. The site signed its own certificate. It then gives me the "Not recommended" option to continue to the site using HTTP. In conclusion I'd appreciate the help if anyone knows how to configure a SSL certificate and get Google Chrome to accept it so I can remote manage my server more securely. Or if there is an adequate workaround.