On Wed, 2011-08-31 at 10:38 -0700, John R Pierce wrote:
On 08/31/11 10:33 AM, Always Learning wrote:
Rather than being a willing or passive victim to 100% of the attacks, I aim to reduce the penetrability of most of them.
an attempted access of a non-vunerability won't be any more effective the millionth time its run than the first time.
It can be effective especially if the IP address is blocked (indefinitely or temporarily).
its the unknown vunerabilities that get you, and your approach will do nothing for these.
Wrong because the IP address used for the unknown attack may have been blocked previously by the procedures already described.
Paul.