[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: POSSIBLE BREAK-IN in auth.log via ssh



* Kevin Philp <lists@cybercolloids.net> [2009 Feb 12 05:25 -0600]:

> 6. If its convenient switch to a different port - the brute force  
> attackers just scan blocks of IP addresses at port 22 - if you are using  
> port 22 you are much less likely to be scanned.

Perhaps you meant, "if you are _not_ using port 22 you are much less
likely to be scanned."  Also, not using port 22 may help to get around
your ISP blocking port 22.

- Nate >>

-- 

"The optimist proclaims that we live in the best of all
possible worlds.  The pessimist fears this is true."

Ham radio, Linux, bikes, and more: http://n0nb.us/index.html


Reply to: