Backup and Recovery
Unfortunately, there may be disgusting individuals who will attempt, and most likely succeed in compromising your retro system. We can easily understand and appreciate that there will be many known attack vectors in older network stacks. Buffer overflows and other known vulnerabilities will be available to anyone who cares to perform a quick search.
One potential option is to essentially resign yourself to the fact that some people will find a way to break our system(s). Therefore, protecting yourself by making an easy recovery or rollback to a 'Golden Image' of your system is a great option.
Be prepared to perform a full recovery of this backup to restage your system. BlueSCSI and IDE-to-CF adaptors can be an excellent mechanism for quickly reimagining with removable media and a modern computer to transfer the data.
To conclude this topic, give yourself the best chance of not getting too cut up if you are hacked. Have a clean image ready to reboot to. You can alert the moderators with any evidence of who is responsible. People found to be breaking the terms of use will be disciplined accordingly.
