[Info-vax] SSH on VAX - performance impact of break in attempts
Bob Koehler
koehler at eisner.nospam.encompasserve.org
Fri Aug 27 10:45:07 EDT 2010
In article <i52ucj$396$1 at lnx107.hrz.tu-darmstadt.de>, m.kraemer at gsi.de (Michael Kraemer) writes:
>
> If - by chance - the right combination of account/password is guessed,
> why would a VMS machine be safer than any other?
VMS is no longer alone in this, but if you don't get that right
combination in the first few tries VMS knows it's under attack and
will deny the login anyhow.
And all those who attack root, lpd, ..., have little chance of
getting a right comination.
More information about the Info-vax
mailing list