Randall R Schulz wrote:
There are technologies which can help, like apparmor/selinux etc, but these are not yet user friendly enough for desktop users to use.
If you have an ssh server listening on the internet and you watch your logs I would be surprised if you have not noticed brute force attacks. Precautions such as strong passwords and fail2ban are important even for home machines if you run sshd.
Yes. We all do. Many times each week. And unless you're very stupid about how you choose passwords, it's nothing but a minor annoyance.
One thing I haven't seen mentioned is using public key authentication. No amount of password guessing will get you into a system that doesn't use passwords for access. I have allowed only ssh and OpenVPN through my firewall and neither uses passwords. I've also got my WiFi outside of the firewall and it uses WPA2, in addition to requiring ssh or OpenVPN to reach my network. -- Use OpenOffice.org http://www.openoffice.org -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org