Re: intrusion via ssh
What I do to look at auth.log is something like `sudo less /var/log/auth.log|grep sshd|less
BTW I have /etc/hosts.allow set as follows:
ALL: LOCAL
# This are my work comps.
ALL : $FIXED_IP1
ALL : $FIXED_IP2
/etc/hosts.deny reads:
ALL: EXCEPT LOCAL
How secure is this?
--
Unix has had thirty years of highly-skilled techical types
demanding basic functionality from the OS.
Mac's have had 20 years of interface nazi's tweaking every facet of the OS.
Microsoft has had... the Windows marketing department.
Reply to: