2008/11/16 Girish Venkatachalam <[EMAIL PROTECTED]>:
> uses logfile monitoring and protects networked hosts from ssh brute
> force attacks. It detects such attacks and blocks the author's address
> with a firewall rule.

What does it do that pf can't?

Best
   Martin

Reply via email to