Sponsored Content
Full Discussion: Anti hack software search
Operating Systems BSD Anti hack software search Post 302537895 by braveh4rt on Monday 11th of July 2011 03:07:06 AM
Old 07-11-2011
Quote:
Originally Posted by patlee
Hi there

I'm looking for anti hack software. I want a few types.

1. User monitoring. If anyone tries to login 3 or more times with the wrong info.. that user should be cut off for 15 minutes

2. Permanent IP Blocking - it would be great to have a user friendly/faster method of Permanent IP blocking - currently I edit the hosts allow.

Any suggestions for Unix FreeBSD would really be appreciated.

Pat Lee
You can do it in BSD.
Try bruteblock in the ports. It can monitoring the log of a service, like ftp, ssh.
If the Ip logged to be error login, for how many time you specify in any hour / day, you can block it for as long as you want.

it works using ipfw or PF, you can chose ..

hope helps
 

4 More Discussions You Might Find Interesting

1. Solaris

Where i have to search for software ?

What is the places where i can search for ports or software for Sun Solaris ?, im new to this OS , and i like it and i like its Java desktop but i cant find a software like which i was use in FreeBSD? so can i use BSD ports ? or there is a place i can search for ports in ?, btw i got SUN companion... (2 Replies)
Discussion started by: XP_2600
2 Replies

2. Windows & DOS: Issues & Discussions

What is Your Favorite Anti-Virus Software for Windows at Home?

I used to have trendmicro I used it for free when I worked with a previous company, when I left I had to uninstall it and switched to using Zone Alarm. I tell you on some days I really want to pull my hair out when my PC really works like a snail and sometimes really so unresponsive for up to... (20 Replies)
Discussion started by: sparcguy
20 Replies

3. Cybersecurity

Anonymous published Sentinel counter-hack anti-cyberterrorism training ISO – Computer

Anonymous published Sentinel counter-hack anti-cyberterrorism training ISO image - Computerworld Blogs The link in their twitter doesn't work any more. https://twitter.com/#!/AnonymousIRC/status/85134355659374593 Anyone know for any link to this iso? maybe server outside the US? ... (1 Reply)
Discussion started by: programAngel
1 Replies

4. Linux

Anti-virus Software Question For Linux

Greetings To All! I am new in supporting Linux and recently I was tasked to find out the following information and am not sure how to find the answers, hence this posting... I am running Redhat Enterprise Server 5.4 I realize this is a Redhat specific question, but it pertains to all of our... (7 Replies)
Discussion started by: Rob Sandifer
7 Replies
LOGIN(1)						    BSD General Commands Manual 						  LOGIN(1)

NAME
login -- log into the computer SYNOPSIS
login [-fp] [-h hostname] [user] DESCRIPTION
The login utility logs users (and pseudo-users) into the computer system. If no user is specified, or if a user is specified and authentication of the user fails, login prompts for a user name. Authentication of users is done via passwords. The options are as follows: -f The -f option is used when a user name is specified to indicate that proper authentication has already been done and that no password need be requested. This option may only be used by the super-user or when an already logged in user is logging in as themselves. -h The -h option specifies the host from which the connection was received. It is used by various daemons such as telnetd(8). This option may only be used by the super-user. -p By default, login discards any previous environment. The -p option disables this behavior. If the file /etc/nologin exists, login dislays its contents to the user and exits. This is used by shutdown(8) to prevent users from logging in when the system is about to go down. Immediately after logging a user in, login displays the system copyright notice, the date and time the user last logged in, the message of the day as well as other information. If the file ``.hushlogin'' exists in the user's home directory, all of these messages are suppressed. This is to simplify logins for non-human users, such as uucp(1). Login then records an entry in the wtmp(5) and utmp(5) files and executes the user's command interpreter. Login enters information into the environment (see environ(7)) specifying the user's home directory (HOME), command interpreter (SHELL), search path (PATH), terminal type (TERM) and user name (both LOGNAME and USER). The standard shells, csh(1) and sh(1), do not fork before executing the login utility. FILES
/etc/motd message-of-the-day /etc/nologin disallows logins /var/run/utmp current logins /var/log/lastlog last login account records /var/log/wtmp login account records /var/mail/user system mailboxes .hushlogin makes login quieter SEE ALSO
chpass(1), passwd(1), rlogin(1), getpass(3), utmp(5), environ(7), HISTORY
A login appeared in Version 6 AT&T UNIX. 4th Berkeley Distribution May 5, 1994 4th Berkeley Distribution
All times are GMT -4. The time now is 07:31 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy