Here's how to use iptable-based methods to protect against hackers' Secure Socket Shell attacks.