* Shri Shrikumar <[EMAIL PROTECTED]> [2006 Nov 15 12:57 -0600]: > Is there a another option? Alternatively, is there a way of > automatically reporting offending ip's?
Is using only version 2 public key authentication not possible? I'm just learning ssh, so maybe I'm misled thinking that is less vulnerable to a brute force attack. - Nate >> -- Wireless | Amateur Radio Station N0NB | Successfully Microsoft Amateur radio exams; ham radio; Linux info @ | free since January 1998. http://www.qsl.net/n0nb/ | "Debian, the choice of My Kawasaki KZ-650 SR @ | a GNU generation!" http://www.networksplus.net/n0nb/ | http://www.debian.org -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]