On Sun, 19 Feb 2012, Denis Heidtmann wrote: > I think the core of my question is what is the likely result of my saying > YES to the login request?
I would not. Set up the host to accept logins only from authorized users (e.g., your son and yourself). Using ssh from the remote host enter password/passphrase and the user is authenticated against /etc/shadow. No action on your part required. There are tools available to check whether you've been rooted but I've not had need for any so others can better advise you. Rich _______________________________________________ PLUG mailing list [email protected] http://lists.pdxlinux.org/mailman/listinfo/plug
