[jp] jpilot 64 bit download
rshepard at appl-ecosys.com
Sat Jan 31 17:19:15 EST 2015
On Sat, 31 Jan 2015, Jose wrote:
> But an attacker is likely to try "root" and "admin" and "administrator", and
> failing, move on to another system.
Two ways to minimize, even avoid, that problem. 1) edit ssh_config to deny
root login and 2) change the ssh port in sshd_config to some number > 20000.
When I had ssh on port 22 the daily logwatch report showed hundreds to
thousands of cracking attempts per day. Since I changed it to a very high
port number there are none.
Now, the Web is a different story; that's more of a people problem.
More information about the Jpilot