How did you detect this / track this, I have ssh open to the net for remote access, and I would like to learn how to detect / defend this kind of thing
Monster logwatch reports showing the password search in /var/log/secure.
How did you detect this / track this, I have ssh open to the net for remote access, and I would like to learn how to detect / defend this kind of thing
Monster logwatch reports showing the password search in /var/log/secure.