On Wed, 2011-08-31 at 19:00 +0100, Always Learning wrote: > On Wed, 2011-08-31 at 13:55 -0400, Lamar Owen wrote: > > > On Wednesday, August 31, 2011 01:33:31 PM Always Learning wrote: > > > Rather than being a willing or passive victim to 100% of the attacks, I > > > aim to reduce the penetrability of most of them. > Still useless: it is not the attacks that you know about and that show themselves as errors in your logs (and filter from the log, that is the only gain), but those where you have a real security hole that you have to worry about. And those will be exploited from one of the many other bots in the hackers botnet. An empty log may give you a nice feeling of security, but it is false... A lot of work, but very little if any gain. Louis _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos