---

Linux.com: Securing a Fresh Linux Install, Part 3

“If you are accessing machines remotely across a network, you
should not be using Telnet. Telnet transmits information, including
passwords, in plain text, which can easily be intercepted and read.
SSH performs much the same task as Telnet, but it does so through
an encrypted tunnel and is therefore much more secure.

“There are a number of configuration options you should consider
when using SSH. These are set in the /etc/ssh/sshd_config and
/etc/ssh/ssh_config files…”

Complete
Story

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis