![](https://www.both.org/wp-content/uploads/2023/09/BlankMillenniumHeader.png)
Security by obscurity — NOT!
As you can see in the posts below I switched internet service providers on Monday of this week. As a result I received a different block of IP addresses than I had before.
I have always heard that it only takes a few minutes for an attack to start on a computer – or any other device like phones and tablets – that is newly connected to the Internet. I determined to see how many (not if) script-kiddie attacks via SSH took place on the first full day after the changeover.
During the full day after getting new IP addresses, I experienced a total of 1634 attack attempts from 37 different IP addresses. I obtained this information from the Logwatch tool which I describe in volumes 2 and 3 of my “Using and Administering Linux: Zero to SysAdmin” series of books.
The crackers behind these attempts are not just searching for new computers to attack. They make the assumption that there is a computer at every IP address and attack regardless. If there is no computer at one IP address they move on to the next.
The point is that your computer or device is not safe just because it was connected to the internet five minutes ago. There are constant attacks going on and your device needs to be protected before it is connected.
Note that this is only one type of attack. There are many others that I did not even consider in this post.
More Stories
Windows security just got worse
Well, it didn't really get any worse, we just found another way in which it's already horrible. Like you, I...
Signal: The Pinnacle of Secure Messaging
In a time of increasing digital privacy threats, Signal has emerged as a hope for those seeking secure and private...
Linux Malware scanning using ClamAV
Image via Creative Commons, modified by Both.org Introduction There are many different ways of protecting a system, right from keeping...
Can Windows security get any worse?
Really -- the lack of security. If you've been reading this site or my books for any length of time,...
Intro to the Linux chown command
Image by: Opensource.com CC-by-SA 4.0 Every file and directory on a Linux system is owned by someone, and the owner...
Intro to the Linux chmod command
Every object on your Linux system has a permission mode that describes what actions a user can perform on it....