Re: POSSIBLE BREAK-IN in auth.log via ssh
* Kevin Philp <lists@cybercolloids.net> [2009 Feb 12 05:25 -0600]:
> 6. If its convenient switch to a different port - the brute force
> attackers just scan blocks of IP addresses at port 22 - if you are using
> port 22 you are much less likely to be scanned.
Perhaps you meant, "if you are _not_ using port 22 you are much less
likely to be scanned." Also, not using port 22 may help to get around
your ISP blocking port 22.
- Nate >>
--
"The optimist proclaims that we live in the best of all
possible worlds. The pessimist fears this is true."
Ham radio, Linux, bikes, and more: http://n0nb.us/index.html
Reply to: