This is one of the methods I’ve used in the past to secure a Linux host against brute force ssh attacks. While its not a perfect method, it does a good job of preventing 100s of brute force entries in your syslog. Tony MattkeNetwork engineer turned management currently servicing the enterprise data center market. I […]