Re: how to find trace of attacks
- To: firstname.lastname@example.org
- Subject: Re: how to find trace of attacks
- From: Andrei Popescu <email@example.com>
- Date: Thu, 1 Jan 2009 13:03:38 +0200
- Message-id: <[🔎] 20090101110338.GO5606@think.homelan>
- In-reply-to: <firstname.lastname@example.org>
- References: <email@example.com> <firstname.lastname@example.org> <495B657F.email@example.com> <20081231145026.GC4132@blitz.hooton> <495BA910.firstname.lastname@example.org> <email@example.com>
On Wed,31.Dec.08, 15:57:14, Jeff Soules wrote:
> If you know where you'll be sshing in from, you can use iptables to
> deny access to the appropriate port with MAC filtering and possibly IP
> range rules.
This won't work because MACs are used only on the local segment.
 local in my case would be between the laptop and my AP
If you can't explain it simply, you don't understand it well enough.
Description: Digital signature