Thanks. These are all good suggestions.

In addition to all the above, it's also a good idea to run sshd under
tcpwrappers. This allows you to allow or deny incoming TCP/IP
connections based on source IP address.

With all these in place, I believe (hope!) the security risks are
reduced to acceptable levels.


-- 
nico
_______________________________________________
plugins mailing list
[email protected]
http://lists.slimdevices.com/lists/listinfo/plugins

Reply via email to