On Sun, 19 Feb 2012, Denis Heidtmann wrote:

> I think the core of my question is what is the likely result of my saying
> YES to the login request?

   I would not. Set up the host to accept logins only from authorized users
(e.g., your son and yourself). Using ssh from the remote host enter
password/passphrase and the user is authenticated against /etc/shadow. No
action on your part required.

   There are tools available to check whether you've been rooted but I've not
had need for any so others can better advise you.

Rich

_______________________________________________
PLUG mailing list
[email protected]
http://lists.pdxlinux.org/mailman/listinfo/plug

Reply via email to