<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: How to Block SSH Brute Force Attacks Using SSHGUARD	</title>
	<atom:link href="https://www.tecmint.com/block-ssh-brute-force-attacks-sshguard/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.tecmint.com/block-ssh-brute-force-attacks-sshguard/</link>
	<description>Tecmint - Linux Howtos, Tutorials, Guides, News, Tips and Tricks.</description>
	<lastBuildDate>Wed, 18 May 2022 11:12:59 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: dave		</title>
		<link>https://www.tecmint.com/block-ssh-brute-force-attacks-sshguard/comment-page-1/#comment-1798878</link>

		<dc:creator><![CDATA[dave]]></dc:creator>
		<pubDate>Wed, 18 May 2022 11:12:59 +0000</pubDate>
		<guid isPermaLink="false">https://www.tecmint.com/?p=45200#comment-1798878</guid>

					<description><![CDATA[[&lt;strong&gt;Debian&lt;/strong&gt;] Before restarting &lt;strong&gt;ufw&lt;/strong&gt; service, to prevent &lt;strong&gt;ufw&lt;/strong&gt; spamming syslog or &lt;strong&gt;kernel.log&lt;/strong&gt; full of [&lt;strong&gt;UFW_BLOCK&lt;/strong&gt;] messages, you might want to edit &lt;strong&gt;/etc/rsyslog.d/20-ufw.conf&lt;/strong&gt; and uncomment the last line &lt;strong&gt;(&#038; stop)&lt;/strong&gt; so that the messages go only to &lt;strong&gt;ufw.log&lt;/strong&gt;.]]></description>
			<content:encoded><![CDATA[<p>[<strong>Debian</strong>] Before restarting <strong>ufw</strong> service, to prevent <strong>ufw</strong> spamming syslog or <strong>kernel.log</strong> full of [<strong>UFW_BLOCK</strong>] messages, you might want to edit <strong>/etc/rsyslog.d/20-ufw.conf</strong> and uncomment the last line <strong>(&amp; stop)</strong> so that the messages go only to <strong>ufw.log</strong>.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Klaus Agnoletti		</title>
		<link>https://www.tecmint.com/block-ssh-brute-force-attacks-sshguard/comment-page-1/#comment-1698195</link>

		<dc:creator><![CDATA[Klaus Agnoletti]]></dc:creator>
		<pubDate>Sat, 08 Jan 2022 00:19:34 +0000</pubDate>
		<guid isPermaLink="false">https://www.tecmint.com/?p=45200#comment-1698195</guid>

					<description><![CDATA[Fail2ban and SSH guard is all good but why not use something truly innovative like CrowdSec (https://crowdsec.net) which works in a more modern way by blocking attacks and sharing the information on attackers with other users?]]></description>
			<content:encoded><![CDATA[<p>Fail2ban and SSH guard is all good but why not use something truly innovative like CrowdSec (<a target="_blank" href="https://crowdsec.net" rel="nofollow ugc">https://crowdsec.net</a>) which works in a more modern way by blocking attacks and sharing the information on attackers with other users?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Foobar		</title>
		<link>https://www.tecmint.com/block-ssh-brute-force-attacks-sshguard/comment-page-1/#comment-1696457</link>

		<dc:creator><![CDATA[Foobar]]></dc:creator>
		<pubDate>Wed, 05 Jan 2022 20:36:38 +0000</pubDate>
		<guid isPermaLink="false">https://www.tecmint.com/?p=45200#comment-1696457</guid>

					<description><![CDATA[Nothing new, fai2ban does the same in a better way...]]></description>
			<content:encoded><![CDATA[<p>Nothing new, fai2ban does the same in a better way&#8230;</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
