![]() |
ÊAdvertise ÊContact ÊSecurityWatch |
Ê Articles | Editorials | Reviews | News | InfoSec Directory | Releases | Submit PR |
GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available. Network Security Software - Sponsored by GFI Network Security. ![]() |
Zombie machines used in 'brutal' SSH attacks Friday, 03 June 2005, 09:06 GMT It's a tedious activity that can put the best of IT administrators to sleep. But as security and compliance manager for a large U.S. healthcare organization, Adam Nunn has learned to study his network activity logs religiously. He knows that when the bad guys work overtime to break his defenses, those logs can be the first sign of trouble. He had a more relaxed approach to log checking at home. But one day he had a look and was alarmed to find that more than 1,000 brute force attacks had been targeting his personal Web server for a month. Read More at Search Security |
Sunday, June 12, 2005 Network Security
Wireless Security
InfoSec Directory
Press Releases
|
ÊCopyright © 2000 - 2005 eBCVG IT Security | Affiliates :: RSS feeds :: PrivacyÊ |
Ê