<br><br><div class="gmail_quote">On Wed, Jan 14, 2009 at 10:47 PM, Res <span dir="ltr"><<a href="mailto:res@ausics.net">res@ausics.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div class="Ih2E3d">On Wed, 14 Jan 2009, Mark Haney wrote:<br>
<br>
</div><div class="Ih2E3d">> Res wrote:<br>
><br>
>><br>
>> Thats not entirely correct, on the couple of exposed ssh servers we have,<br>
>> we have never seen an attempt for root. They've thrown just about every<br>
>> other random and generated names at them, but never root, the scripties<br>
>> who write these things, in recent years are cluey enough to know people<br>
>> take measures. In fact of all my years, I'd have to go back to the early<br>
>> to mid 90's to recall the last attempts for a remote root login on ssh.<br>
>><br>
>> Maybe its geographics, who knows...<br>
>></div></blockquote></div><br>I am the OP here and did you see that the breaking was aimed at root?<br clear="all"><br>-- <br>Douglas E Knapp<br><br>Amazon Gift Cards; let them choose!!<br><a href="http://www.amazon.com/gp/product/B001078FFE?ie=UTF8&tag=seattlebujinkand&linkCode=as2&camp=1789&creative=9325&creativeASIN=B001078FFE">http://www.amazon.com/gp/product/B001078FFE?ie=UTF8&tag=seattlebujinkand&linkCode=as2&camp=1789&creative=9325&creativeASIN=B001078FFE</a><br>