QUOTE(Alex9182 @ Apr 30 2018, 11:14 PM)
Did a search on topic "router security" and first page will find: -
PCworld.com
"Avoid using routers supplied by ISPs".
tomsguide.com
"If your router is given to you by your internet service provider [ISP], you don't want to use"
routersecurity.org
"Many people use the device given them by their Internet Service Provider (ISP) which I think is a bad idea"
See attached, I can confirm that, before i update Archer C1200 firmware to Aus version, it has back door and on my Network Location, there are many unknown PC. after update, all gone.
now i will not use TM router as main router again, use it as AP or bridge is ok.
You believe the stuff written at PCWorld? PCworld.com
"Avoid using routers supplied by ISPs".
tomsguide.com
"If your router is given to you by your internet service provider [ISP], you don't want to use"
routersecurity.org
"Many people use the device given them by their Internet Service Provider (ISP) which I think is a bad idea"
See attached, I can confirm that, before i update Archer C1200 firmware to Aus version, it has back door and on my Network Location, there are many unknown PC. after update, all gone.
now i will not use TM router as main router again, use it as AP or bridge is ok.
There are other places that tend to be more balanced views as the folks there actually know what they are talking about.
TM stock router in the early days DIR-615 (orange and white) is amazing. Only issue was single band and weak wifi which is easily solved by disabling its wifi and bridging with a good dual band AP (yes dual band was expensive as TPLink, Dlink, ASUS those days were not selling dual bands yet). Runs for months (usually reboot result of TNB power failure) without need for reboot unlike the routers from TM these days which are crappy so it seems.
Apr 30 2018, 11:32 PM

Quote
0.0298sec
0.49
6 queries
GZIP Disabled