On Wed, 19 May 2004, Scot L. Harris wrote: > In your place I would setup ssh. The thing you need to make sure of is > if you are using password authentication that all your passwords are > good ones. I believe you may want to lock down ssh to specific known > hosts and keys. Even if you need to administer multiple systems > remotely use one to ssh to and then ssh from that one to the others. > Also disable roots use of ssh so no one can go straight in as root. > Means you will login as a normal user then su to root as needed. Disable SSH version 1 protocol support too :) This is done in /etc/ssh/sshd_config by including a line "Protocol 2". Regards, .lzs