(no title)
dwj | 13 years ago
After being burned in the past, I always install iptables and block incoming connections. Plus I only allow ssh access to certain ip addresses. This means that even in the worst case if a vulnerability lets a rootkit get installed, there isn't much they can do after that.
No comments yet.