Securing SSH access

Von Fugal von at
Tue Apr 1 11:52:17 MDT 2008

<quote name="Daniel" date="Fri, 28 Mar 2008 at 21:27 -0600">
> I say if you can enforce key-based authentication that is the way to go.

I second the key only approach.

Von Fugal
Freedom is Popular
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : 

More information about the PLUG mailing list