On Thu, Jan 14, 2010 at 4:44 AM, Daniel J. Summers
wrote:
> The non-standard name for the
> superuser is a technique called "security by obscurity"
>
> Do users get unlimited SSH
> attempts, or do you ban IPs after three to five failed attempts?
A technique known as "built-in DOS vulnerabilities
N K wrote:
By default, all connections to DB are restricted by only local ones. I
use the only superuser with non-standard name and very simple password
- "one" or "two", for example. Connection to DB is established over
SSH. Is it safe such technique?
That depends on what you're using the dat
Στις Tuesday 12 January 2010 10:33:56 ο/η N K έγραψε:
> By default, all connections to DB are restricted by only local ones. I use
> the only superuser with non-standard name and very simple password - "one"
> or "two", for example. Connection to DB is established over SSH. Is it safe
> such techni
By default, all connections to DB are restricted by only local ones. I use
the only superuser with non-standard name and very simple password - "one"
or "two", for example. Connection to DB is established over SSH. Is it safe
such technique?