Dec 7, 2011 5:58 AM Lamar Owen <lo...@pari.edu> 작성:

> On Tuesday, December 06, 2011 04:45:04 PM Johnny Hughes wrote:
>> If I had to guess, I would say that the attackers probably developed
>> their code on CentOS, so they were looking for a CentOS machine to
>> deploy their code on in the wild.  That would be why I would say CentOS
>> was the OS used.
> 
> I read the Kaspersky article and the comments, and the use of 'up2date' in 
> the transcript could possibly point to someone used to upstream EL.  But it 
> does illustrate three major points:
> 3.) Keep good passwords.  This can't be stressed enough: if your password was 
> successfully brute-forced it is now in the brute-forcer's *dictionary* of 
> passwords to try in the future and should never be used again, regardless of 
> how secure it might seem.  I happen to have a copy of an older brute-forcer 
> dictionary here (somewhere) and it's very large and has lots of very 
> secure-seeming passwords in it.
> 
Why not don't allow root login from ssh? That's basic yet effective. 
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to