Mike Kercher wrote:
iptables, disallow root login via ssh, no valid shell for users that
don't need one, strong passwords, keys would be a good start.
Mike
iptables..add the ip of the attack source to reject? They keep moving
IP, this is very time consuming (but I am doing it). I don't allow root
login. I think I got a good password, and I got keys setup so I know
I'm talking to my server.
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos