What user names do hackers try on my computers?
Thinking about hacker attacks and computer security in general the other day, I configured a Internet connected machine with an open ssh login prompt in order to track what user names try to connect to it and then made a small web application that updates periodically and shows that information in a graph.
You can see it here, also for now I will set up a permanent link in the main blog menu.
Bye!