Quote:
Originally Posted by Bama
Actually, yes, I would 
|
I'm just curious as I don't know that software inside out...
If the bad guy is using a new proxy(new ip address) and is able to login in 1 attempt, how can you know that has malicious intent and is a bad guy?
Of course in your logs you'll see all the ips that did connect successfully, but you probably can't identify him.
Now if you're getting hammered by dictionnary attacks or brute force even if the guy is using a proxy list... of course it's gonna figure it out...
__________________
A girl once told me "Give me 8 inches and make it HURT".
So, I fucked her twice and hit her with a brick.