> From: Matthew Gillen <[email protected]>
> To: [email protected]

I use the rule that only "user" accounts, not accounts installed by the
distribution or software packages can be logged in via ssh.  That means
that an effective attacker must know *something* about my particular
setup to have any hope of logging in.

Dale
_______________________________________________
Discuss mailing list
[email protected]
http://lists.blu.org/mailman/listinfo/discuss

Reply via email to