Three locks for your SSH doorSep 02, 2010, 19:04 (0 Talkback[s])
(Other stories by Federico Kereki)
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
[ Thanks to An Anonymous Reader for this link. ]
"Summary: Security always requires a multi-layered scheme. SSH is a good example of this. Methods range from simple sshd configuration through the use of PAM to specify who can use SSH, to application of port-knocking techniques, or to hide the fact that SSH access even exists. Applying these techniques can make life much harder for possible intruders, who will have to go past three unusual barriers.
0 Talkback[s] (click to add your comment)