Hi,
As some may know already, I recently got DSL. It's not a super fast
connection by broadband standards but it does mean that my box may be
easier to find for a hacker. So, I have a few questions about
security. I think I am OK but want to make sure.
1: I have a good root password. It's
On Saturday 05 September 2009 11:56:09 Dale wrote:
Hi,
As some may know already, I recently got DSL. It's not a super fast
connection by broadband standards but it does mean that my box may be
easier to find for a hacker. So, I have a few questions about
security. I think I am OK but
Alan McKinnon wrote:
On Saturday 05 September 2009 11:56:09 Dale wrote:
Hi,
As some may know already, I recently got DSL. It's not a super fast
connection by broadband standards but it does mean that my box may be
easier to find for a hacker. So, I have a few questions about
security.
On Sat, Sep 05, 2009 at 06:01:21AM -0500, Penguin Lover Dale squawked:
Since ssh is not running, I assume it doesn't matter at this point?
I'll check into fail2ban and denyhosts. Any one better or more
preferred than the other?
AFAIK, either of those are for brute force attacks on SSHD. If
Hey Willie - a 67 line sig ?
festus
--
I just want to break even.
pgpu1Of2XUcCi.pgp
Description: PGP signature
John J. Foster wrote:
Hey Willie - a 67 line sig ?
festus
It was funny tho. LOL
Dale
:-) :-)
On Sat, Sep 05, 2009 at 08:11:30AM -0600, Penguin Lover John J. Foster squawked:
Hey Willie - a 67 line sig ?
festus
My apologies.
My sigs are randomly pulled from fortune (with some custom databases).
Usually I try to make sure that the ones that ends up going to mailing
lists are not
On 5 Sep 2009, at 15:48, Willie Wong wrote:
On Sat, Sep 05, 2009 at 08:11:30AM -0600, Penguin Lover John J.
Foster squawked:
Hey Willie - a 67 line sig ?
festus
My apologies.
My sigs are randomly pulled from fortune (with some custom databases).
Usually I *_try_* to make sure that the
8 matches
Mail list logo