Pete, thanks for the tips!
I had been using SSH on my server for a long time. I've contemplated going over to VPN...but I just find OpenSSH suites my needs.
The main point of my rant was I never liked that the SSH server was the same as my server, but it was the only box that I had that had enough smarts and was on all the time.
With this, I'll be running SSH anyhow, even if it's just to terminal into the box. However, I might end up using RSYNC (as crashplan won't work...as damage pointed out). I just don't know at this point. I really want to have some sort of remote storage for the most important stuff, as you are aware of what happened to my file server...I just don't want to fall into that again.
The other thing I've contemplated is using
port knocking...well, it took me 6 months, but I figure out how to dynamically open and close ports (through script) in the Windows firewall...then I switched to Win7. Doesn't seem to work the same (or I have some security thing wrong).
At any rate, with this box running linux, I can now use the port knocking servers that are out there!! My only concern regarding this is, I think there is a way to detect if the port is there using a malformed
call to the port. I.e. the port responds...I'll have to see if this is still worth my time to try...however, like I said, this would / could really work! Hide all my ports except the HS one (I just like using that as a single click...and I pushed it up over 9000 so I'm playing the odds on that one, since it's such a high value...). It SHOULDN'T as the Firewall is SUPPOSED to prevent it from having ANY response (i.e. what is called a stealth port). Right now, I think all my ports, except the SSH port and Homeseer port act stealth...but I think 1/2 of the open ports would response to a Stealth Scan using the NMAP Security Scanner.
Thanks for both of your tips and pointers! I think it has saved me about 1-2 weeks worth of effort on this thing so far!!
--Dan