Jon M. Hanson wrote: > Josef Lowder wrote: >> . >> Are Linux boxes vulnerable to be used by botnets? >> >> This article in USA Today is frightening. >> >> http://www.usatoday.com/tech/news/computersecurity/2008-03-16-computer-botnets_N.htm >> >> > Probably at least once a day my Linux box that I have co-located is > probed for a weak password /account through SSH. I'm not sure what > they would do to the system if they got in and I'm not going to find > out. When I see an SSH probe happen I track down who owns the IP and > report it. I also nmap the IP to see what services are running on the > system. That seems like too much work =P Most of the probes, ssh attacks, etc. that I see are from foreign countries and I really don't see much benefit in reporting them. What I do on all my servers is use 2 little tools to help stop these automated attacks: DenyHosts (http://denyhosts.sourceforge.net/) and PortSentry (http://sourceforge.net/projects/sentrytools/) With these 2, a high number (I would say 99% but then I have no proof to back it up) of attacks are immediately stopped in their tracks. If someone is doing a port scan on your entire server, do you *really* think they're doing it for a good reason? -Mike --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change your mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss