Thanks. These are all good suggestions. In addition to all the above, it's also a good idea to run sshd under tcpwrappers. This allows you to allow or deny incoming TCP/IP connections based on source IP address.
With all these in place, I believe (hope!) the security risks are reduced to acceptable levels. -- nico _______________________________________________ plugins mailing list [email protected] http://lists.slimdevices.com/lists/listinfo/plugins
