dcsimg
Linux Today: Linux News On Internet Time.





More on LinuxToday


Linux.com: Securing a Fresh Linux Install, Part 3

Apr 26, 2004, 07:00 (0 Talkback[s])
(Other stories by Mike Peters)

WEBINAR:
On-Demand

Re-Imagining Linux Platforms to Meet the Needs of Cloud Service Providers


"If you are accessing machines remotely across a network, you should not be using Telnet. Telnet transmits information, including passwords, in plain text, which can easily be intercepted and read. SSH performs much the same task as Telnet, but it does so through an encrypted tunnel and is therefore much more secure.

"There are a number of configuration options you should consider when using SSH. These are set in the /etc/ssh/sshd_config and /etc/ssh/ssh_config files..."

Complete Story

Related Stories: