iptables, disallow root login via ssh, no valid shell for users that don't need one, strong passwords, keys would be a good start. Mike On Tue, Mar 25, 2008 at 11:48 AM, Tim Alberts <talberts@xxxxxxxxxxxxx> wrote: > So I setup ssh on a server so I could do some work from home and I think > the second I opened it every sorry monkey from around the world has been > trying every account name imaginable to get into the system. > > What's a good way to deal with this? > > _______________________________________________ > CentOS mailing list > CentOS@xxxxxxxxxx > http://lists.centos.org/mailman/listinfo/centos > _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos