bruteforce protection howto
Mihamina Rakotomandimby
mihamina at gulfsat.mg
Tue Mar 23 14:05:34 UTC 2010
> Franz Waldmüller <waldbauernbub at gmx.at> :
> I agree with the other posters,
Yes, but it's not enough: The logs are analyzed on a different host
(the "logger").
How would you suggest to update he "router"setting _from_ the "logger".
Using SSH with key authentication would be one solution:
http://bashcurescancer.com/run_remote_commands_with_ssh.html
http://wiki.mikrotik.com/wiki/Use_SSH_to_execute_commands_(DSA_key_login)
http://www.cyberciti.biz/tips/distributed-administration-using-ssh.html
--
Architecte Informatique chez Blueline/Gulfsat:
Administration Systeme, Recherche & Developpement
+261 34 29 155 34 / +261 33 11 207 36
More information about the ubuntu-users
mailing list