Eric Keller wrote:
>   OTOH, I seem to remember that
> anonymous got into someone's home router somehow, probably by guessing the
> person's password.
>   
One GREAT tool that can be used on Linux nodes that are used as 
router/firewalls
is denyhosts.  It checks the login failures, and if a threshold is 
exceeded -- IP by
IP -- it adds that IP to the /etc/hosts.deny list.  To that offender, 
your node has
just disappeared completely from the net.  You can set many parameters on
how many attempts, over what period, trigger the action, and how long that
ban lasts for.  Totally wiped the hacker crowd off my system, and I had been
attacked by professional bank hackers with huge botnets used to crack 
systems.
Once they figured out I had extremely tight settings so that 3 failed 
login attempts
to any account name over a two week period would get them kicked off for 
a long
time, they totally stopped trying.

Jon

------------------------------------------------------------------------------
Virtualization & Cloud Management Using Capacity Planning
Cloud computing makes use of virtualization - but cloud computing 
also focuses on allowing computing to be delivered as a service.
http://www.accelacomm.com/jaw/sfnl/114/51521223/
_______________________________________________
Emc-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/emc-users

Reply via email to