Okay, I think I understand the explanation. I’m sure it will make more sense when I compare what you said to what I find while doing it.
However, I do still feel some squish-butt regarding the login exposure. These hack attempts are non-stop, and quite annoying. Which gives me an idea for a suggestion to a future added feature: Build a software bazooka that will trace back to the source of the attacks and melt their processors. Maybe throw in the added sound effect piped through their speaker of a whistling projectile that is about to rain down on them, and a voice that sounds like Bela Lugosi in Dracula saying, “Bwa–ha–ha-ha-haaaaaa!!”
Yeah, I’d pay for that feature.