[NLUUG]   Welcome to ftp.vim.org,
Hosted by ftp.nluug.nl
Current directory: /ftp/os/Linux/distr/salix/i486/extra-15.0/source/network/sshguard/
Contents of README:
sshguard protects hosts from brute-force attacks against SSH and other
services. It aggregates system logs and blocks repeat offenders using
one of several firewall backends, including iptables, ipfw, and pf.

sshguard can read log messages from standard input (suitable for piping
from syslog) or monitor one or more log files. Log messages are parsed,
line-by-line, for recognized patterns. If an attack, such as several
login failures within a few seconds, is detected, the offending IP is
blocked. Offenders are unblocked after a set interval, but can be semi-
permanently banned using the blacklist option.

IMPORTANT:

1. You will need to properly set up an "sshguard" chain in your firewall
   backend. For further information consult `sshguard-setup(7)`.

2. Starting with version 2.0.0, SSHGuard **requires** a config file
   to start. `sshguard.conf` as shipped with this SlackBuild provides
   defaults such that they reassemble the values that were previously
   specified on the command line in the `rc.sshguard` script.

   See `examples/sshguard.conf.sample` in the doc directory for
   additional config options.

Icon  Name                                                      Last modified      Size  
[DIR] Parent Directory - [TXT] README 11-Jun-2022 15:16 1.1K [   ] doinst.sh 11-Jun-2022 15:16 475 [   ] rc.sshguard 07-May-2022 09:04 2.7K [TXT] slack-desc 11-Jun-2022 15:16 889 [   ] sshguard-2.4.2.tar.gz 11-Jun-2022 15:16 816K [TXT] sshguard.SlackBuild 07-May-2022 09:04 3.1K [   ] sshguard.conf 11-Jun-2022 15:16 345 [   ] sshguard.info 11-Jun-2022 15:16 322

NLUUG - Open Systems. Open Standards
Become a member and get discounts on conferences and more, see the NLUUG website!