Linux.com: Securing a Fresh Linux Install, Part 3
Apr 26, 2004, 07:00 (0 Talkback[s])
(Other stories by Mike Peters)
How to Help Your Business Become an AI Early Adopter
"If you are accessing machines remotely across a network, you
should not be using Telnet. Telnet transmits information, including
passwords, in plain text, which can easily be intercepted and read.
SSH performs much the same task as Telnet, but it does so through
an encrypted tunnel and is therefore much more secure.
"There are a number of configuration options you should consider
when using SSH. These are set in the /etc/ssh/sshd_config and