Personally, I think hiding a computer behind a firewall is much more
secure. That adds another line of defense before they get into your
network. Beside appliances are typically more secure (as opposed to a
server sitting directly on the internet). I doubt that a log can crash the
PC unless the system is running seriously low on disk space. On Windows you
never truly know the culprit though. I would say your theory is more likely.

--
Mike Wills
http://mikewills.me


On Tue, Jan 10, 2012 at 2:10 PM, Roger Vicker, CCP <rv-tech@xxxxxxxxxx>wrote:

Hello,

I've got a windows 2008 system that we use RDP on to remote into the
local network for maintenance and support. We've been logging a lot of
invalid logon attempts from the internet. One admin thinks that these
are causing the server to lock up about once a month. I think it is a
memory leak from the SQL server instance for the backup software.
Blocking RDP from all but a few IPs isn't really viable as when we are
outside we are mobile and seldom know ahead of time what IP we will be
using.

Has anyone else seen a server brought down by invalid RDP logins?

Other than switching to a VPN, how have you dealt with large number of
login attempts?

Thanks.

Roger Vicker, CCP

--
*** Vicker Programming and Service *** Have bits will byte ***
www.vicker.com ***
Don't be afraid to take a big step if one is indicated. You can't cross a
chasm in two small jumps. -- David Loyd George

--
This is the PC Technical Discussion for iSeries Users (PcTech) mailing list
To post a message email: PcTech@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/pctech
or email: PcTech-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/pctech.


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.