Anyone here have any cautionary advice about using the ssh to war games on
their site?

My grandson just spent last week at a Cyber Security Camp offered by the U
of West Florida, and they used it for many of their activities.

On Debian it’s the “bandit” package that provides ssh access without any
user prep except the installed package—and I’m not used to that at all.

Thanks.

-Tom

Reply via email to