2008/11/16 Girish Venkatachalam <[EMAIL PROTECTED]>: > uses logfile monitoring and protects networked hosts from ssh brute > force attacks. It detects such attacks and blocks the author's address > with a firewall rule.
What does it do that pf can't? Best Martin