Linux.com: Securing a Fresh Linux Install, Part 3
Apr 26, 2004, 07:00 (0 Talkback[s])
(Other stories by Mike Peters)
Re-Imagining Linux Platforms to Meet the Needs of Cloud Service Providers
"If you are accessing machines remotely across a network, you
should not be using Telnet. Telnet transmits information, including
passwords, in plain text, which can easily be intercepted and read.
SSH performs much the same task as Telnet, but it does so through
an encrypted tunnel and is therefore much more secure.
"There are a number of configuration options you should consider
when using SSH. These are set in the /etc/ssh/sshd_config and