Gregg Levine wrote:

David, your assertion that would take 37 seconds for some pest to
promptly try to annoy the site that Stephen Frazier configured is
indeed fact. Not too long ago I brought a new Slackware (Intel) system
online for some development work, and since I had the SSH port open
for other purposes, some idiot promptly found it and was rubbing the
penguin the wrong way.

I use tcpwrappers to restrict access to my ssh port to those regions of
the world where I might be (Western Australia). I've found some minor
discrepancies, but it's pretty rare these days that someone uses it to
enumerate my login accounts.

Firewall rules would do about as well.


--

Cheers
John

-- spambait
[EMAIL PROTECTED]  [EMAIL PROTECTED]

Please do not reply off-list

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

Reply via email to