An anonymous reader writes: The Security-Hacks blog has published 5 tips to defend against SSH brute-force attacks. They list configuration options as well as a list of automated anti brute-force utilities. The tips are intended as an aid for all Linux users.
Thus spake the master programmer:
"When a program is being tested, it is too late to make design changes."
-- Geoffrey James, "The Tao of Programming"