Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
You can also utilize methods to automatically block hosts, without manual intervention, say after three seperate TCP ports receive incoming requests from remote hosts. You should auto-block on cases like this if you can, an think it is necessary, but you are not likely being specifically targeted. If you are, you have larger issues. Just stay patched, keep a low attack surface, and if possible, don't keep any unnecessary ports open to the public. If you need something like SSH, and only you you utilize it, think about utilizing single packet authentication like fwknop... -- Kristian Erik Hermansen "I have no special talent. I am only passionately curious." -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean. _______________________________________________ Discuss mailing list [hidden email] http://lists.blu.org/mailman/listinfo/discuss
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |