> In that case, the best thing you can do is figure out the IP ranges of > either location.
Definately a good idea, thanks Eric. > Btw. I found two articles on securityfocus.com, the first is analysis > using a honeypot, as you see these attacks are pretty lame: > http://www.symantec.com/connect/articles/analyzing-malicious-ssh-login-attempts > Then somebody having to respond, because security was pretty lame: > http://www.symantec.com/connect/articles/responding-brute-force-ssh-attack?ref=rss Thanks for posting those links, interesting information there. Jamie _______________________________________________ [email protected] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[email protected]"
