|
Most hackers use port scanning make sure you get a good firewall and block every port you can, this might scare them off. They roll out onto thousands of servers and wait for a reply from there scans.
It's kinda like how a thief passes a car when they see the blinking alarm on the dash. If they see your firewall it will lead them to the next box that's showing a up front weakness.
Basically any intense hacker can break a box you just to try and detour them before they get to interested.
I would do a format they could of left another route anywhere on your box.
Good luck,
Charles
|