This is one of the methods I’ve used in the past to secure a Linux host against brute force ssh attacks. While its not a perfect method, it does a good job of preventing 100s of brute force entries in your syslog. Tony MattkeNetwork engineer turned management currently servicing the enterprise data center market. I […]
Regular Expression Basics
Before I even get started, I want to mention that not all regular expression metacharacters are supported in every application. Keep this in mind when building your matches. Regular expressions are made up of normal characters and metacharacters. Normal characters include upper and lower case letters and numerals. The metacharacters have special meanings and can […]