If you are thinking of brute-force attacks on open ports, have a look at "fail2ban" - would use logs on your workstation and your firewall setup to block attempts.
Are there specific applications/services you are concerned about? If you are thinking about SSHD, consider use of ssh-keygen for user/host certificates. On Thu, Feb 20, 2020 at 3:22 PM home user <[email protected]> wrote: > > (on 02/20/2020 1:11pm mountain time, Jack said) > > router logs help me... > My system is isp -> modem -> workstation. No router at this time. > _______________________________________________ > users mailing list -- [email protected] > To unsubscribe send an email to [email protected] > Fedora Code of Conduct: > https://docs.fedoraproject.org/en-US/project/code-of-conduct/ > List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines > List Archives: > https://lists.fedoraproject.org/archives/list/[email protected] _______________________________________________ users mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/[email protected]
