On Fri, 2007-08-03 at 16:42 +1000, [EMAIL PROTECTED] wrote:
>         I prefer to use something like denyhosts to simply block the
>         offending ip's
>         as moving the port seems somewhat to be security through
>         obscurity.
>         But this kind of activity isn't new, by any means. a few
>         months ago when I
>         setup a SSH server open to the world and watched the logs I
>         had a rush of
>         them get blocked in the first few days, then it quietened
>         down. All of them
>         where other compromised windows/linux boxes.
>         

How do you know whether your linux box is compromised apart from using
something like a root kit checker?

What other software or info is there for a user like me who operates
mostly at a GUI level and for whom hacking is a black art??

Regards,

Nick Tomlin

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to