Possible hacking on SSH what should I do?
Neil Watson
tlug-neil-8agRmHhQ+n2CxnSzwYWP7Q at public.gmane.org
Tue Jul 13 20:20:44 UTC 2010
Be sure your ssh service is hardened. I recommend allowing only key
authentication and limiting which users are allowed in.
There is little to be gained by trying to catch the cracker. Chances
are that the IP is that of a zombie under remote control.
--
Neil Watson
Linux/UNIX Consultant
http://watson-wilson.ca
--
The Toronto Linux Users Group. Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists
More information about the Legacy
mailing list