Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 15948  |
|  Al DeRosa to Scott Street  |
|  Re: Small improvement to 'connect.mps'  |
|  18 Jun 25 20:04:23  |
 
TID: Mystic BBS 1.12 A48
MSGID: 1:267/157 5c241431
REPLY: 1:266/625 7ea1e4c9
TZUTC: -0400
On 16 Jun 2025, Scott Street said the following...
SS> Some time ago, I installed connect.mps/x to help the robots from causing
SS> mayhem to my telnet and telnets ports. I also turned on the automatic
SS> blacklisting function in MIS to avoid repeated nonsense from the
SS> Internet. That's been fine, but I really disliked the fact that it
SS> slowed down my SSH connections. So I have added a bit of code to
SS> connect.mps to recognize that I'm coming in SSH (or RLOGIN) and if my
SS> username is valid, the connection get to skip the "Press ESC twice to
SS> continue..."
Scott you might also want to look at the Phenom Productions bot breaker. It
allows SSH access by bypassing it completely .Mystic won't let a SSH
connection through unless the handle and password match.
|11 Bucko |14- |06Wrong Number Family Of BBS' |07- |03www.wrgnbr.com
... A SQL query walks into a bar and sees two tables. Asks: 'Can I join you?'
--- Mystic BBS v1.12 A48 (Linux/64)
* Origin: The Wrong Number Family Of BBS' - Wrong Number ][ (1:267/157)
SEEN-BY: 103/705 105/81 106/201 124/5016 128/187 129/14 305 153/757
SEEN-BY: 153/7715 154/10 30 110 203/0 218/700 840 220/70 221/0 226/17
SEEN-BY: 226/30 100 227/114 229/110 111 114 206 300 307 317 400 426
SEEN-BY: 229/428 470 550 664 700 705 240/1120 5832 263/1 266/512 267/118
SEEN-BY: 267/150 157 159 160 331 585 800 280/464 5003 5006 291/111
SEEN-BY: 292/854 8125 301/1 320/219 322/757 341/66 234 342/200 396/45
SEEN-BY: 423/120 460/58 256 1124 467/888 633/280 712/848 770/1 3 100
SEEN-BY: 770/340 772/210 220 230 902/26 5020/400 8912 5054/30 5075/35
PATH: 267/157 800 770/1 280/464 460/58 229/426
|
[ << oldest | < older | list | newer > | newest >> ]