|
|
Modify Remote Login server to block scripted attacks
Damn! Me too!
Modify Remote Login server to block scripted attacks
No need to run a poll:
One more note:
If we want to be paranoid about things, why not also go through your apache logs? I guarantee you will see dozens, if not hundreds, of attempts to "exploit" various vulnerabilities (usually in IIS). Should we go out of our way to "block" those hosts? If you have that kind of time on your hands, knock yourself out. But if you're running a secure configuration - as a fully patched Mac OS X installation in its default configuration is - and have strong passwords (and, for home users, operate behind a hardware NAT/firewall appliance such as a Linksys router or AirPort Base Station), there is no need to jump through all sorts hoops to "protect" yourself from these myriad scripts.
Modify Remote Login server to block scripted attacks
I use logcheck to automatically scan my logs for 'unusual' activity and send me an e-mail if something has happened.
Answering your question, this sort of thing happens on a regular basis. The number of accounts that a given script attempts to compromise varies greatly greatly. I currently see one of these attacks on my server per day on average. |
SearchFrom our Sponsor...Latest Mountain Lion HintsWhat's New:HintsNo new hintsComments last 2 daysNo new commentsLinks last 2 weeksNo recent new linksWhat's New in the Forums?
Hints by TopicNews from Macworld
From Our Sponsors |
|
Copyright © 2014 IDG Consumer & SMB (Privacy Policy) Contact Us All trademarks and copyrights on this page are owned by their respective owners. |
Visit other IDG sites: |
|
|
|
Created this page in 0.12 seconds |
|