Anyone here have any cautionary advice about using the ssh to war games on their site?
My grandson just spent last week at a Cyber Security Camp offered by the U of West Florida, and they used it for many of their activities. On Debian it’s the “bandit” package that provides ssh access without any user prep except the installed package—and I’m not used to that at all. Thanks. -Tom