Re: [CentOS] I've been hacked -- what should I do next?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Steve Huff napsal(a):
> let me add another suggestion to the flood: once you've rebuilt the box,
> install DenyHosts (http://denyhosts.sourceforge.net/).  this tool is
> quite effective at blocking brute-force ssh attacks; not only will this
> make it much harder for an attacker even if you should happen to set a
> weak password on an account in the future, but it will also reduce the
> amount of CPU time and memory wasted on dealing with brute-force ssh
> attacks.
> 

My suggestion is pam_abl.
David
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux