We have been attacked from multiples IP at www.
I need protect the our cluster from those attacks..... hohoho
How I do to keep protected ssh protocol from those attacks??????
Which tips and tricks??????
Where are the manuals or files or lines code to I modified????
Rossano Renir Comunelo
Master Degree Student
Federal University of Santa Catarina
rossano AT lmpt DOT ufsc DOT br
rcomunelo AT pop DOT com DOT br