How effective is brute forcing against SSH if someone is aware of your username? What security features are built in, and what should I do to increase security?

1 Answer

Answer :

Very effective. My Mac OS X Servers have been cracked a couple times because of this. I’ve since closed port 22 to all traffic from outside our LAN. Legit users who need to access the server either have to be on the local network or tunnel in through a VPN. How you would do this would depend on your platform, network setup, and user needs. You can look at your secure.log and easily see if you are under attack. My logs from a week or so prior to the successful crack read like a dictionary of names and password combos. Make sure your root account is disabled, and use something other than admin as your user name. If you can, enforce secure password creation – like a min of 8 characters including at least 1 digit and 1 letter.

Related questions

Description : How to set up an SSH tunnel to a secure home network?

Last Answer : So what is at the other end, on your home net. You will need something running SSH on the other to decrypt the packets.

Description : If I'm using SVN+SSH, do I still need to leave the SVN port open on the server?

Last Answer : answer:The ssh port should be sufficient. You’re tunneling the svn through the ssh so having svn open is actually redundant. Here’s some proof to backup my statement.

Description : What would you have said, instead of "Et tu, Brute?"?

Last Answer : I wouldn’t say anything. I won’t use my last words condemning someone.

Description : Can a person rsyc using SSH from a remote location to a file server?

Last Answer : Are you trying to sync your local music to a remote server? You've built a mythtv box, kudos. That's not easy. (I'm calling the machine you ssh into your local machine) local -> file Then you ... file Is that correct? You're on the right track with the second command. Let me look up the syntax.

Description : What is the command line for copying from a Mac to iPhone via SSH Terminal?

Last Answer : Nevermind

Description : Just wondering on how the ssh provider earns if they are giving a month free ssh accounts?

Last Answer : They may earn less, or maybe even higher pay by the hour. And if it is remote based they may use a different computer as they may have 2 computers, or have different servers.

Description : Define PGP and SSH

Last Answer : Pretty Good Privacy is used to provide security for electronic mail. It provides authentication, confidentiality, data integrity, and non repudiation. A collection of public domain software ... commands and transfer files and also provide strong client/server authentication / message integrity.

Description : My friend says Microsoft is forcing Windows 10 on us (details inside). Is this correct?

Last Answer : I am not sure, but I received on Goole Chrome a messege that Google chrome will NOT be able to update as it does not recognize Micro soft word nor Vista anymore. Basically..update or not get updates on Chrome. I have not done anything yet. I do not mind NOT getting Goolge Chrome updates.

Description : Remote Upload: username:password:website.com?

Last Answer : I believe you’re talking about FTP, though I have not used it for a lot of uploading through browsers so I’m afraid I can’t help you too much with it.

Description : My ipod won't let me access my mail? It says "The user name or password for "imap.apple.yahoo.com" is incorrect" and I know my password and username are both correct.

Last Answer : you should try the apple support forums.

Description : Is someone forcing you to watch pornography sexual harrasment/abuse?

Last Answer : Yes.

Description : Is Telegram more secure than other social apps ? If so, why ? How much people in Bangladesh are aware of the security of the social app ? Is Telegram more secure than other social apps ? If so, why ? How much people in Bangladesh are aware of the security of the social app ?

Last Answer : answer:

Description : Are there cloud computing security risks that I should be aware of?

Last Answer : Jul 27, 2011 " Cloud computing can be a convenient way to store and share data, but there are six cloud computing security risks that consumers should be aware of. ... When users entrust their information to a cloud, they risk not being able ...

Description : What are you features in my Mac that I'm not aware of?

Last Answer : Target disk mode is cool. It means that you can connect 2 Macs together via Firewire and one computer sees the other as a hard disk, making it great for transferring large files or large numbers of files. ... while holding down the T' key and it will show up like a Firewire drive on the other Mac.

Description : 56. The nurse is aware that acromegaly is a condition when growth hormone occurs in excess in adulthood or after epiphyses of the long bones have fused. The following are the typical features of the disorder except

Last Answer : C. The client grows taller

Description : Why is someone else's username and password put into the login area of a website I frequent?

Last Answer : Split personality? Or someone is using your tablet when you don’t know. It should not happen unless you bought the tablet second hand.

Description : Why would some group go out of their way to create a day forcing people to do something they're allowed to do anyway?

Last Answer : It is the reason they exist, probably hoping to convert, in one day, all the Muslims, Jews, Buddhists and atheists to ultra conservative Christians.

Description : Do you think forcing this 17 year old girl to undergo chemo to treat her cancer is the right thing to do?

Last Answer : answer:Would it be different if the kid were 18? Remember Terry Schiavo, who the state of Florida wouldn't let die despite her known directions to the contrary? AT age 17, the kid is old enough and mature ... to have a say over her daughter. What the state is doing is the Nanny state at its worst.

Description : Walmart caught forcing employees to donate to republicans. How long until they force you to vote for them, too?

Last Answer : Using David Pokeman’s own words Is legal kinda jumped out at me.

Description : Is it okay for a certain organization or firm to force their IT staff to use proprietary software and then forcing to illegally snatch the development tools from the internet?

Last Answer : No. The point at which her company asks her to do something illegal, she should explain that it is illegal and why it is illegal, that she can’t do her job without the software, and get it.

Description : How do you deal with a time when you feel as if people close to you are basically forcing you to act in a way that'll hurt them?

Last Answer : arg, that’s a really tough situation! be strong! hopefully other ask-publicites will have more specific advice! i just wanted to say i feel for you.

Description : Why do you think Apple is forcing iPod Touch customers to pay up again?

Last Answer : iPhone is a contract deal (as in 2 yr cell contract) and iPod Touch is not. Due to this, the accounting is different and Apple “has to” charge extra for the iPod Touch updates. That’s the official explanation from Apple, which Jobs references in the SDK announcement video stream.

Description : How do you raise a child to want and yern to practice a certain religion, without forcing it on them, inturn causing them to stray?

Last Answer : Step 1. When they are of age to choose to do something, do not force them to go to service,mass,whatever. Its annoying.

Description : Is a celling fan forcing the warm air downword convection?

Last Answer : Need answer

Description : What is it called when capturing sailors and forcing them into military service?

Last Answer : What is the answer ?

Description : How does the last amount of liquid in a straw get into your mouth when the cup is empty and there is no more surface liquid for atmospheric pressure to work on forcing the liquid up the straw?

Last Answer : Air pressure within the straw.

Description : How can I stop wage garnishment from forcing me into poverty?

Last Answer : Check out BCSAlliance.com, they have a great guide on how to stop wage garnishment. Yahoo answers has a good thread on stopping wage garnishment. That should point you in the right direction.

Description : What is the reasoning behind forcing people to pay taxes in a free market economy?

Last Answer : To provide revenues for government programs needed to protect the free market. -apex

Description : Scavenging air in diesel engine means a. air used for combustion under pressure b. forced air for cooling the cylinder c. burnt air containing products of combustion d. air used for forcing burnt gases out of the engines cylinder during the exhaust stroke

Last Answer : ANSWER d. air used for forcing burnt gases out of the engines cylinder during the exhaust stroke

Description : Industrial exit policy means - (1) forcing foreign companies to leave India (2) forcing business units to move out of congested localities (3) allowing manufacturers to shift their line of products (4) allowing business units to close down

Last Answer : (4) allowing business units to close down Explanation: The term 'exit' is the obverse of the term 'entry' into industry. It refers to the right or ability of an industrial unit ... 1991 when it was felt that without labor market flexibility, efficient industrialization would be difficult to achieve.

Description : The failure of ball bearings used in electric motors can result from _____________. A. failure to clean the bearing before repacking B. failure to maintain proper alignment C. excess lubrication forcing the bearing full of grease and eliminating all areas of expansion D. all of the above

Last Answer : Answer: D

Description : The purpose of a short circuit forcing module (short time trip) installed in a branch line is to provide ____________. A. high speed clearance of low impedance short circuits in the branch B. ... C. isolation of short circuits by selective tripping of branch circuit breakers D. all of the above

Last Answer : Answer: D

Description : Melt spinning of polymers involves the forcing of polymer melt through spinnerates (fine holes) into an atmosphere kept at a temperature lower than the melting point of the polymer, which causes the fine diameter ... the __________ fibres. (A) Acrylic (B) Polyester (C) Nylon 6:6 (D) Polypropylene

Last Answer : (A) Acrylic

Description : Forcing a person to sign a sample is considered as

Last Answer : Violation of freedom of liberty

Description : Do it because I said to” is the mantra for project managers who use _____ as the  default approach to resolve conflict. Select one: a. collaborating b. compromising c. accommodating d. forcing e. avoiding

Last Answer : d. forcing

Description : You are the project manager for a cable service provider. Your team members are  amiable with each other and are careful to make project decisions jointly. Which of the  following statements is true?  ... stage of Develop Project Team. D. They are in the forcing stage of Develop Project Team.

Last Answer : B. They are in the norming stage of Develop Project Team.

Description : Which conflict resolution technique do project managers use most often?  A. Smoothing B. Norming C. Confronting D. Forcing

Last Answer : C. Confronting

Description : What is the advantage of field forcing in the rotor?  

Last Answer : Field forcing acts for 10 seconds to maintain the generator terminal voltage during fault condition so as to operated the protection relays. 

Description : The acceleration of flowering by manipulating environmental conditions is known as: a. Pulsing b. Forcing c. Leaching d. After-ripening

Last Answer : Forcing

Description : Production of vegetable out of their normal season of outdoor production is known as: a. Vegetable forcing b. Out of season c. Crop production d. Tissue culture

Last Answer : Vegetable forcing

Description : Tunnels for vegetable forcing are categorized as a. High type b. Low type c. Walk in type d. All of these

Last Answer : All of these

Description : Vegetable production for local consumption is: e. Market gardening a. Home gardening b. Truck gardening c. Vegetable forcing

Last Answer : Market gardening

Description : Which of the following emits dangerous radioactive wastes forcing the government to eliminate its use? (a) Nuclear energy (b) Water energy (c) Geothermal energy (d) Solar energy

Last Answer : (a) Nuclear energy

Description : Dry saturated steam can be converted into superheated steam by (A) Increasing its cross-sectional area of flow (B) Passing it through a pressure reducing valve (C) Forcing it downwards through a vertical tube (D) None of these

Last Answer : (B) Passing it through a pressure reducing valve

Description : The climate sensitivity parameter is defined as the rate of change of A. Surface temperature with albedo of earth B. Surface temperature with CO2 concentration in atmosphere C. Precipitation with earth’s temperature D. Surface temperature with radioactive forcing.

Last Answer : D. Surface temperature with radioactive forcing.

Description : What are the forms of password cracking techniques?  AttackSyllable  AttackBrute Forcing  AttacksHybrid  All of the above

Last Answer :  All of the above

Description : ___ coffee is prepared by forcing an atomized spray of very strong coffee extract through a jet of hot air. a. Decaffeinated c. Black b. Instant d. Espresso

Last Answer : b. Instant

Description : Industrial exit policy means (1) forcing foreign companies to leave India (2) forcing business units to move out of congested localities (3) allowing manufacturers to shift their line of products (4) allowing business units to close down

Last Answer : allowing business units to close down

Description : Why isn't the Internet self aware?

Last Answer : Because we didn’t build the Internet to think nor has the Internet had billions of years of evolutionary pressure/selection to result in self awareness.

Description : When a computer first becomes self-aware, will it act morally?

Last Answer : Of course not…didn’t you see Westworld?