All, I've always thought this interesting, so I'll ask... I thought SSH(2) used hosts.deny & hosts.allow. I find it interesting, then, that I get so many (L)users trying to hack my SSH connection. Any thoughts? Maybe I missed something in my setup? -Tom