According to the Information Week article:
http://www.informationweek.com/news/security/attacks/showArticle.jhtml?articleID=207603339
One of the more interesting bits was that the attacks are shifting to a more
distributed model to avoid detection by IDS/IPS systems, using botnets.
Many distros
On Thu, 2008-05-15 at 09:47 -0400, Bob King wrote:
I always thought that disabling root access via ssh is a good idea,
but reading this I would assume it would be a good idea to just
deactivate password access via ssh all together and limit access to
systems with keys known to the host.
On Thu, 15 May 2008 09:47:39 -0400
Bob King [EMAIL PROTECTED] wrote:
According to the Information Week article:
http://www.informationweek.com/news/security/attacks/showArticle.jhtml?articleID=207603339
One of the more interesting bits was that the attacks are shifting to a more