Merge pull request #2490 from theo-l/master

Theo-l translating
This commit is contained in:
Xingyu.Wang 2015-03-09 11:13:05 +08:00
commit 063c95a4e9
2 changed files with 7 additions and 1 deletions

View File

@ -1,10 +1,12 @@
theol-l translating
The Curious Case of the Disappearing Distros
关于消失的发行版的古怪情形。
================================================================================
![](http://www.linuxinsider.com/ai/828896/linux-distros.jpg)
"Linux is a big game now, with billions of dollars of profit, and it's the best thing since sliced bread, but corporations are taking control, and slowly but systematically, community distros are being killed," said Google+ blogger Alessandro Ebersol. "Linux is slowly becoming just like BSD, where companies use and abuse it and give very little in return."
"Linux现在成为了一个大型的游戏同时具有巨额的利润这是有史以来最好的事情。但是公司企业进行了控制于是缓慢而系统的社区发行版就逐渐被干掉了",Google+的一个博主 Alessandro Ebersol说到。"Linux开始变得像BSD--一些公司使用和滥用但是没有任何回报--一样缓慢。"
Well the holidays are pretty much upon us at last here in the Linux blogosphere, and there's nowhere left to hide. The next two weeks or so promise little more than a blur of forced social occasions and too-large meals, punctuated only -- for the luckier ones among us -- by occasional respite down at the Broken Windows Lounge.

View File

@ -1,7 +1,11 @@
theo-l translating
How to protect SSH server from brute force attacks using fail2ban
如何使用fail2ban来保护SSH服务器避免暴力破解攻击。
================
One common attack on SSH service is brute force attacks where a remote attacker indefinitely attempts to log in with different passwords. Of course there are arguments against password authentication for SSH, and alternative authentication mechanisms such as [public key authentication][1] or [two-factor authentication][2] exist to obsolete such attacks. Putting aside pros and cons of different authentication methods, let's consider the situation where password authentication is required. How would you protect your SSH server against brute-force attacks?
对于SSH服务的常见的攻击就是暴力破解攻击--远程攻击者通过不同的密码来进行无限地登录尝试。当然SSH存在参数来防备密码验证以及可用的验证机制例如[公钥验证][1]或者[双重验证][2]
[fail2ban][3] is a well-known open-source intrusion prevention framework on Linux that monitors various system log files (e.g., /var/log/auth.log or /var/log/secure) and automatically triggers various defensive actions upon detecting any suspicious activities. In fact, fail2ban can be quite useful to defend against brute force password guessing attacks on an SSH server.
@ -167,4 +171,4 @@ via: http://linoxide.com/tools/linux-compress-decompress-tools/
[1]:http://xmodulo.com/how-to-force-ssh-login-via-public-key-authentication.html
[2]:http://xmodulo.com/two-factor-authentication-ssh-login-linux.html
[3]:http://www.fail2ban.org/
[4]:http://xmodulo.com/2013/03/how-to-set-up-epel-repository-on-centos.html
[4]:http://xmodulo.com/2013/03/how-to-set-up-epel-repository-on-centos.html