Gregg Levine wrote:
David, your assertion that would take 37 seconds for some pest to promptly try to annoy the site that Stephen Frazier configured is indeed fact. Not too long ago I brought a new Slackware (Intel) system online for some development work, and since I had the SSH port open for other purposes, some idiot promptly found it and was rubbing the penguin the wrong way.
I use tcpwrappers to restrict access to my ssh port to those regions of the world where I might be (Western Australia). I've found some minor discrepancies, but it's pretty rare these days that someone uses it to enumerate my login accounts. Firewall rules would do about as well. -- Cheers John -- spambait [EMAIL PROTECTED] [EMAIL PROTECTED] Please do not reply off-list ---------------------------------------------------------------------- For LINUX-390 subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit http://www.marist.edu/htbin/wlvindex?LINUX-390
