How to Install and Uninstall sshguard.x86_64 Package on Rocky Linux 8
Last updated: November 13,2024
1. Install "sshguard.x86_64" package
In this section, we are going to explain the necessary steps to install sshguard.x86_64 on Rocky Linux 8
$
sudo dnf update
Copied
$
sudo dnf install
sshguard.x86_64
Copied
2. Uninstall "sshguard.x86_64" package
This guide let you learn how to uninstall sshguard.x86_64 on Rocky Linux 8:
$
sudo dnf remove
sshguard.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the sshguard.x86_64 package on Rocky Linux 8
Last metadata expiration check: 2:10:17 ago on Mon Sep 12 10:27:18 2022.
Available Packages
Name : sshguard
Version : 2.4.2
Release : 6.el8
Architecture : x86_64
Size : 365 k
Source : sshguard-2.4.2-6.el8.src.rpm
Repository : epel
Summary : Protects hosts from brute-force attacks against SSH and other services
URL : http://www.sshguard.net
License : BSD and GPLv2+
Description : Sshguard protects hosts from brute-force attacks against SSH and other
: services. It aggregates system logs and blocks repeat offenders using one of
: several firewall backends.
:
: Sshguard can read log messages from standard input or monitor one or more log
: files. Log messages are parsed, line-by-line, for recognized patterns. If an
: attack, such as several login failures within a few seconds, is detected, the
: offending IP is blocked. Offenders are unblocked after a set interval, but can
: be semi-permanently banned using the blacklist option.
Available Packages
Name : sshguard
Version : 2.4.2
Release : 6.el8
Architecture : x86_64
Size : 365 k
Source : sshguard-2.4.2-6.el8.src.rpm
Repository : epel
Summary : Protects hosts from brute-force attacks against SSH and other services
URL : http://www.sshguard.net
License : BSD and GPLv2+
Description : Sshguard protects hosts from brute-force attacks against SSH and other
: services. It aggregates system logs and blocks repeat offenders using one of
: several firewall backends.
:
: Sshguard can read log messages from standard input or monitor one or more log
: files. Log messages are parsed, line-by-line, for recognized patterns. If an
: attack, such as several login failures within a few seconds, is detected, the
: offending IP is blocked. Offenders are unblocked after a set interval, but can
: be semi-permanently banned using the blacklist option.