Dio9sys@lemmy.blahaj.zone to Asklemmy@lemmy.ml · 1 year agoLemmy, what are some of your "oh shit" work stories?message-squaremessage-square164fedilinkarrow-up1201arrow-down14
arrow-up1197arrow-down1message-squareLemmy, what are some of your "oh shit" work stories?Dio9sys@lemmy.blahaj.zone to Asklemmy@lemmy.ml · 1 year agomessage-square164fedilink
minus-squarelud@lemm.eelinkfedilinkarrow-up7arrow-down2·11 months agoIt helps against stupid automated attacks though. If someone has changed the port it’s likely that they have set up a great password or disabled password auth all together. It’s worth it for just having cleaner logs and fewer attempts.
minus-squaredan@upvote.aulinkfedilinkarrow-up3·11 months ago It’s worth it for just having cleaner logs Those logs are useful to know which IPs to permanently block :)
It helps against stupid automated attacks though.
If someone has changed the port it’s likely that they have set up a great password or disabled password auth all together.
It’s worth it for just having cleaner logs and fewer attempts.
Those logs are useful to know which IPs to permanently block :)