<br><br>
<div class="gmail_quote">On Thu, Jan 22, 2009 at 6:05 PM, Wilton Helm <span dir="ltr"><<a href="mailto:whelm@compuserve.com">whelm@compuserve.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">
<div bgcolor="#ffffff">
<div class="Ih2E3d">
<div><font face="Arial" size="2"><font face="Times New Roman" size="3">>making sure to patch any holes through which the hacker might have come </font></font></div>
<div><font face="Arial" size="2"></font> </div></div>
<div><font face="Arial" size="2">In my case, I had been getting regular attacks through SSH for months, probably 100 a day (bots). Apparently after nine months of this, someone stumbled on to my password which regrettably was composed of two dictionary words with no special characters, making it susceptible to dictionary search.</font></div>
<div><font face="Arial" size="2"></font> </div>
<div><font face="Arial" size="2">When I re-installed, I put SSH on a non-standard port and haven't had a single attempt to attack the system since.</font></div>
<div><font face="Arial" size="2"></font> </div></div></blockquote>
<div> </div>
<div>While its certainly not a good idea to rely on... security through obscurity can work very well :)</div>
<div> </div>
<div> </div>
<div>--</div>
<div>Matt</div></div>