Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: comments added... (Score 2, Interesting) 578 578

I find it rather funny that the Linux code is well commented but the SVR4 code has little to no comments at all. Just because the function names are the same doesn't mean it was copied. It just means that the coders implemented functions with the same names (and I bet that the Linux versions worked rather differently than the original SVR4 code).

Comment: DenyHosts (Score 1) 6 6

I use a package called DenyHosts under debian. It seems to work ok for the standard scripted attacks. The best suggestion is to use tcpwrappers and restrict access. Of course also you want to use firewall rules as well and disable access for root through ssh (use sudo if you need root/admin access).

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...