iptables, disallow root login via ssh, no valid shell for users that
don't need one, strong passwords, keys would be a good start.

Mike


On Tue, Mar 25, 2008 at 11:48 AM, Tim Alberts <[EMAIL PROTECTED]> wrote:
> So I setup ssh on a server so I could do some work from home and I think
>  the second I opened it every sorry monkey from around the world has been
>  trying every account name imaginable to get into the system.
>
>  What's a good way to deal with this?
>
>  _______________________________________________
>  CentOS mailing list
>  CentOS@centos.org
>  http://lists.centos.org/mailman/listinfo/centos
>
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to