[Info-vax] SSH on VAX - performance impact of break in attempts

Bill Gunshannon billg999 at cs.uofs.edu
Thu Aug 26 09:40:37 EDT 2010


In article <4C75EDE9.5060502 at vsm.com.au>,
	Jeremy Begg <jeremy.removethis at vsm.com.au> writes:
> Hi Mark,
> 
> I can recommend from personal experience both of the following solutions:
> 
> 1.  Change the incoming port to something other than 22.  This almost always 
> prevents your system being targetted by the bots.  (I typically add another 
> three digits to the port number.)

It also prevents legitimate users from getting in if they don't already
know what port you are using.  Reminds me of the guy I know locally who
was trying to run a webserver from home even though it is prohibited by
his AUP with his ISP.  He said he got around it by not using port 80 and
moving the port around a lot.  Seemed rather silly to me as no one would
ever know where to find his webserver!!

bill

-- 
Bill Gunshannon          |  de-moc-ra-cy (di mok' ra see) n.  Three wolves
billg999 at cs.scranton.edu |  and a sheep voting on what's for dinner.
University of Scranton   |
Scranton, Pennsylvania   |         #include <std.disclaimer.h>   



More information about the Info-vax mailing list