[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: intrusion via ssh



What I do to look at auth.log is something like `sudo less /var/log/auth.log|grep sshd|less

BTW I have /etc/hosts.allow set as follows:
 ALL: LOCAL
 # This are my work comps.
 ALL : $FIXED_IP1
 ALL : $FIXED_IP2
/etc/hosts.deny reads:
 ALL: EXCEPT LOCAL

How secure is this?
-- 
Unix has had thirty years of highly-skilled techical types
 demanding basic functionality from the OS.
Mac's have had 20 years of interface nazi's tweaking every facet of the OS.
Microsoft has had... the Windows marketing department.



Reply to: