- Defending against brute force ssh attacks
There are many different methods to defend against brute force ssh attacks on networked hosts. This paper gives an overview about these different defenses, and outlines their respective advantages and disadvantages.
The paper also presents a new, simple and reliable defense method.
- Linux Kernel Rootkits
This paper presents a technical overview about rootkits that are used to subvert the running kernel on a Linux system in order to hide a malicious intruder and secure his/her access to the host.