FISHING FOR HACKERS: ANALYSIS OF A LINUX SERVER ATTACK

  A few days ago I stumbled upon a classic blog post covering common recommendations for hardening a fresh new Linux server: install fail2ban, disable SSH password authentication, randomize SSH port, configure iptables, etc. That got me thinking: what would happen if I did exactly the opposite? Fonte: Hackinsight.org