For this reason pretty much all modern operating systems do not bend over backwards to maintain usability on old hardware, and I support this.
But -- what if you wish to run a historic operating system on historic hardware? You have to be aware you are creating a security nightmare. IF your system is not Internet Aware (i.e., MSDOS, CP/M, etc.), you don't have a big problem (in fact, let's go as far as to say, "you have no problem"). But if you hope to attach it to the Internet, or even if the system COULD be attached to the Internet and your OS is no longer supported (i.e., OS/2, Windows 9x, Windows 2000, XP, Windows 7, etc.), you need to be aware you have a security nightmare on your hands.
And I'll be honest here: You should take my advice, but I doubt you will. But you get no right to complain to me when the likely happens.
Network and security people will bristle when I say this, but it's true(ish): a simple router acts as a basic firewall. The router makes all the computers behind it look like one node on the Internet, with one public IP address. It does this by keeping track of which computer makes a request from an outside service, and it routes the reply back to the requester. The good news is when an unsolicited request comes in from the outside world, the router literally has no idea where to send it, so it drops it. This is a huge protection for your computers. You can still have something bad happen, but your computer has to initiate the query.
So...a computer with no software running on it is "safe" behind a router. (unfortunately, there are no computers with "no" software running on them!). Think of the router as a one-way valve to the Internet.
Download files to your modern computers, copy them to CD or USB stick (or floppy!) and move them to the old computer.
This is difficult for most people, however. And keep in mind, your TV, phone, and a lot of other things in your house are probably also connected to the Internet. Fortunately, for the most part, your TV and phone are running very different code than your historic computer, so the odds that one bit of malware will jump between your TV and your historic computer is very low (though demonstrated possible, not a common real world issue at the time I write this).
Unfortunately, most consumer routers don't have multiple ports, and configuring a system like this is tricky.
However, there's a way you can use conventional home routers to "Fake" a multi-port firewall. Remember, I said above a router acts as a one-way valve to the internet...machines behind it can go out, the outside can't come in.
So, a simple trick is adding a second router to your network, and put your trusted machines behind the second router.
Most likely, your first router between you and the Internet is controlled by your Internet company, so I'm going to assume you can't change it. You have to add a router, and you will have to actually do a bit of configuration on that, as it's internal network range is likely to conflict with your existing internal network config.- untrusted computer / Internet --- <<router<< ---+-+--- <<router<< --- (trusted computers) \ - untrusted computer
So ... if your existing home network is in the range 192.168.0.0-192.168.0.255, you will need to set your second router's internal network to a different range -- an easy choice might be 192.168.2.0-192.168.2.255.
You now move all your maintained hardware behind the SECOND router.
The upside is, you have really good isolation between the untrusted and the trusted networks. The downside is, your trusted machines have two routers to hop through, and your second router, if not sufficient in performance, may throttle your Internet access more than you wish. Considering the amount of Internet bandwidth many people have in their homes now, having a router with sufficent performance could cost a bit. The second router will add a small amount of lag. Normal users will not notice, but some gamers may feel the slight bit of extra latency. But then, I wouldn't trust most gamer machines, so maybe the game machines should be in the untrusted network anyway.
My personal choice here would be OpenBSD, but almost any open source OS that can be used to build a firewall can do this, including FreeBSD and Linux.
The trick is to make a NAT (Network Address Translation) firewall. It should attach to your existing internal network, and it should provide a separate subnet for your untrusted systems. It will provide DHCP network config to the untrusted network. But it also has a set of firewall rules that block access from the untrusted network to the subnet of the trusted network. So ... the rules would be something like this, if your internal trusted network was 192.168.0.0/24:
So...traffic is admitted and forwarded AS LONG AS it isn't being sent to your home network. So...now, the double routing is only impacting your untrusted machines.pass in from protected block in from protected to 192.168.0.0/24
If you aren't familiar with setting up firewalls and networking, this is not enough information for you to do this, but if you are, this might give you ideas on how to do this.
Note: these firewall and router tricks do NOT protect your historic
computer, they are as vulnerable as ever. However, it is will be
much more difficult for your historic computers to cause problems for your
machines you use for important or business applications.
Holland Consulting home
page
Contact Holland Consulting
since February 17, 2022
Copyright 2022, Nick Holland, Holland Consulting