* Shri Shrikumar <[EMAIL PROTECTED]> [2006 Nov 15 12:57 -0600]:

> Is there a another option? Alternatively, is there a way of 
> automatically reporting offending ip's?

Is using only version 2 public key authentication not possible?  I'm
just learning ssh, so maybe I'm misled thinking that is less vulnerable
to a brute force attack.

- Nate >>

-- 
 Wireless | Amateur Radio Station N0NB          |  Successfully Microsoft
  Amateur radio exams; ham radio; Linux info @  | free since January 1998.
             http://www.qsl.net/n0nb/           |  "Debian, the choice of
             My Kawasaki KZ-650 SR @            |     a GNU generation!"
        http://www.networksplus.net/n0nb/       |   http://www.debian.org


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to