HCHTech
Well-Known Member
- Reaction score
- 4,248
- Location
- Pittsburgh, PA - USA
For a while now, I have been installing Chrome on the main server I use for administering a client's stuff. I do this so I can access various internal equipment's web admin pages - printers, NAS, network equipment, etc. I set the home/start pages to about:blank, and I restrict access to only whitelisted IPs by editing the shortcuts to launch Chrome like the following example:
"C:\Program Files\Google\Chrome\Application\chrome.exe" -host-rules="MAP * 127.0.0.1, EXCLUDE 172.16.1.241"
This just plain works better than trying to use IE. I'm sure it's not as secure my way, but I'm wondering how excited to get about that fact. It's only me accessing the server, In case I forget and try to download a new driver or something, this acts more like a not-so-subtle reminder: "Oh yeah, I'm on a server, don't browse the internet, dummy."
I've been reading a LOT lately about servers and setups, so I'm wondering if I should rethink this practice. How many demerits should I get?
"C:\Program Files\Google\Chrome\Application\chrome.exe" -host-rules="MAP * 127.0.0.1, EXCLUDE 172.16.1.241"
This just plain works better than trying to use IE. I'm sure it's not as secure my way, but I'm wondering how excited to get about that fact. It's only me accessing the server, In case I forget and try to download a new driver or something, this acts more like a not-so-subtle reminder: "Oh yeah, I'm on a server, don't browse the internet, dummy."
I've been reading a LOT lately about servers and setups, so I'm wondering if I should rethink this practice. How many demerits should I get?