> From: Matthew Gillen <[email protected]> > To: [email protected]
I use the rule that only "user" accounts, not accounts installed by the distribution or software packages can be logged in via ssh. That means that an effective attacker must know *something* about my particular setup to have any hope of logging in. Dale _______________________________________________ Discuss mailing list [email protected] http://lists.blu.org/mailman/listinfo/discuss
