The Low-Intensity, Brute-Force Zombies Are Back 203
Peter N. M. Hansteen writes "In real life, zombies feed off both weak minds and the weak passwords they choose. When the distributed brute-force attempts stopped abruptly after a couple of months of futile pounding on ssh servers, most of us thought they had seen sense and given up. Now, it seems that they have not; they are back. 'This can only mean that there were enough successful attempts at guessing people's weak passwords in the last round that our unknown perpetrators found it worthwhile to start another round. For all I know they may have been at it all along, probing other parts of the Internet ...' The article has some analysis and links to fresh log data."
Not seeing it yet (Score:4, Funny)
Oh... (Score:5, Funny)
[puts shotgun down]
I'm safe... (Score:5, Funny)
Re:I'm safe... (Score:3, Funny)
pinkie? C'mon, gimme a hint.
Re:I'm safe... (Score:1, Funny)
I just cracked it. Very clever using a roman numeral 10 there.
Re:why are passwords even allowed? (Score:1, Funny)
" I run log-guardian.pl to "3 strikes - you're out" the idiots who do the brute-forces by putting them into iptables"
Good to know that if I spoof your IP address I'll prevent you from login your own machines.
Re:why are passwords even allowed? (Score:3, Funny)
Re:I'm safe... (Score:5, Funny)
Re:I'm safe... (Score:3, Funny)
reference [bash.org]