Stephen R Laniel wrote: > 1) What do y'all use to block attackers like this? It seems > to me that anyone who tries to login with a nonexistent > login name should be blocked immediately, for at least an > hour. Because after all, real people never make tpyos.. -- see shy jo
Attachment:
signature.asc
Description: Digital signature