...
If your system is available through ssh on the Internet key based authentication should be used.
Even with preventative software such as fail2ban we have observed honeypot system being compromised within 3 days of being set up.
...
...
If your system is available through ssh on the Internet key based authentication should be used.
Even with preventative software such as fail2ban we have observed honeypot system being compromised within 3 days of being set up.
...