how could directadmin or any measurement could protect vm-pop3 from being brute-force attack ?
for imap, since it uses xinetd to launch the service, it could be protect by cps or instance.
but how about vm-pop3d ?
since I notice that vm-pop3d is running as own daemon
Is it possible to start vm-pop3d with xinetd ?
________
vaporizers
for imap, since it uses xinetd to launch the service, it could be protect by cps or instance.
but how about vm-pop3d ?
since I notice that vm-pop3d is running as own daemon
Is it possible to start vm-pop3d with xinetd ?
________
vaporizers
Last edited: