[Info-vax] SSH on VAX - performance impact of break in attempts
Graham Burley
burley at Encompasserve.org
Thu Aug 26 11:47:01 EDT 2010
In article <673e4a7c-2427-4629-99aa-2ec221021e5a at q1g2000yqg.googlegroups.com>, Peter Weaver <info-vax at weaverconsulting.ca> writes:
>I created ROOT/ROOT account a long time ago that went to a .COM that
>emulated a bunch of unix commands.
I set-up something similar on Deathrow (deathrow.vistech.net) ...
>But none of the attacks ever tried the password root for the account
>root :(
The Deathrow root account has the password password, but still:
Username: ROOT Owner: root
Expiration: (none) Pwdminimum: 6 Login Fails: 38481
Last Login: 10-MAY-2010 23:27 (interactive), 18-MAR-2007 12:33 (non-interactive)
More information about the Info-vax
mailing list