security What user names do hackers try on my computers? Thinking about hacker attacks and computer security in general the other day, I configured a Internet connected machine with an open ssh login prompt in order to track what user names try to connect to it and then made a small web application that