Become a fan of Slashdot on Facebook


Forgot your password?
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment comments added... (Score 2, Interesting) 578

I find it rather funny that the Linux code is well commented but the SVR4 code has little to no comments at all. Just because the function names are the same doesn't mean it was copied. It just means that the coders implemented functions with the same names (and I bet that the Linux versions worked rather differently than the original SVR4 code).

Comment DenyHosts (Score 1) 6

I use a package called DenyHosts under debian. It seems to work ok for the standard scripted attacks. The best suggestion is to use tcpwrappers and restrict access. Of course also you want to use firewall rules as well and disable access for root through ssh (use sudo if you need root/admin access).

Slashdot Top Deals

RAM wasn't built in a day.