[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Blocking SSH attackers



Stephen R Laniel wrote:
> 1) What do y'all use to block attackers like this? It seems
>    to me that anyone who tries to login with a nonexistent
>    login name should be blocked immediately, for at least an
>    hour.

Because after all, real people never make tpyos..

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature


Reply to: