SSH brute force China and Linux: best practices