@[email protected] to [email protected] • 1 year agoLemmy, what are some of your "oh shit" work stories?message-square143fedilinkarrow-up1190arrow-down14
arrow-up1186arrow-down1message-squareLemmy, what are some of your "oh shit" work stories?@[email protected] to [email protected] • 1 year agomessage-square143fedilink
minus-square@[email protected]linkfedilink5•1 year agoIt helps against stupid automated attacks though. If someone has changed the port it’s likely that they have set up a great password or disabled password auth all together. It’s worth it for just having cleaner logs and fewer attempts.
minus-square@[email protected]linkfedilink3•1 year ago It’s worth it for just having cleaner logs Those logs are useful to know which IPs to permanently block :)
It helps against stupid automated attacks though.
If someone has changed the port it’s likely that they have set up a great password or disabled password auth all together.
It’s worth it for just having cleaner logs and fewer attempts.
Those logs are useful to know which IPs to permanently block :)