To To 1. It's very simple. After setting the firewall to set the root user's password incorrectly for 3 times, the user cannot log in again within 24 hours, so not only others cannot log in, but even those who know the password cannot log in. 2. Close the ssh port, use vnc directly, if you want to use it, open ssh in vnc 3. Close the ssh process. Similarly, just enter vnc when it is used, so you don’t need to modify the port 4. Close the ssh port and connect to the ssh port through a software agent that can be crawled 5. Forward the ssh port to another machine of its own, as a honeypot to collect passwords 6. The ssh port load balance is forwarded to neighboring machines on other network segments, even if the password is scanned out, the machine is safe, harming others and benefiting oneself. 7. friendship mjj supplement <br>
--------------------------------------- --------------
Netizens reply: To To I cannot log in. . . Really scan your machine 24 hours, you don’t need to log in your machine 24 hours...
Netizens reply: To To Quote: guoguomiao published on 2020-9-2318:50 I cannot log in. . . Really scan your machine 24 hours, you don’t need to log in your machine 24 hours...
Netizens reply: To To Which is your step or choice? Look at Article 5. This is called "being a firewall"? I didn't see any strategic judgment. This is not clearly the dream of Dr. Zhao, who has a weak language foundation.
Netizen reply: To To This is too much trouble for you, it's okay to find something to do for yourself. It is enough to change the port plus the key plus the specified ip
Netizen reply: To To Close the password login, use the key. Then add a fail2ban, take it away without thanks.
Netizens reply: To To Simply change the port of sshd, this scan software is stupid, so I feel dizzy,
Netizen Reply: To To Nothing to look for, just turn off the password for honeymoon login, and I have never changed the port
Netizen reply: To To As for, what a precious machine. The port has also been changed before. Now I don’t even bother to change the port for a long time. Most machines still use the same password.
Netizens reply: To To I have tested it, if the port is not changed, the sshd is violently tested, the cpu will rise, After changing the port, the cpu doesn’t respond,
Netizen reply: To To I changed the SSH port and disabled root login. Su
Netizen Reply: To To Why is it so troublesome Directly strong the password, you scan it slowly!
Netizens reply: To To The pagoda is the source, see the py source code. After all, there are many pagoda user groups
Netizens reply: To To Why is it so troublesome? According to what you said, there is a simpler way. The SSH port is closed by the security group. Open when you use it
Netizen reply: To To Turn on the VPS at all times Shut down the VPS when not in use This saves money
Netizens reply: To To You can easily lock yourself out like this. If the keyboard is accidentally disturbed for 1 minute, you can enter all the wrong passwords three times.
Netizens reply: To To Poweroff is safe, since it is a waste of dust, then shutting down is the best choice.
Netizens reply: To To aptinstall-yfail2ban Relieve all your worries Except for password 12345
Netizens reply: To To Does anyone use the private key? You don’t have to enter the login password. Change to a higher port
Netizen reply: To To Quote: 88232128 published in 2020-9-2412:43 What is the operation of changing vnc, vnc can not also blast
Netizens reply: To To The last one is a few layers of forwarding. If you are on the 7th layer, it is not that you are scanning others, and you will be titled.

Label: none