If you are thinking of brute-force attacks on open ports, have a look at "fail2ban" - would use logs on your workstation and your firewall setup to block attempts.
Are there specific applications/services you are concerned about? If you are thinking about SSHD, consider use of ssh-keygen for user/host certificates.
On Thu, Feb 20, 2020 at 3:22 PM home user mattisonw@comcast.net wrote:
(on 02/20/2020 1:11pm mountain time, Jack said)
router logs help me...
My system is isp -> modem -> workstation. No router at this time. _______________________________________________ users mailing list -- users@lists.fedoraproject.org To unsubscribe send an email to users-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org