On Tue, Sep 27, 2005 at 09:39:56PM -0500, C. Bensend wrote:
> >     Why?. Why why why why why....
> >
> >     If you're going to trust the untrusted machine anyway running a virus
> > run-time environment just google for putty, download and run it.
> 
> I find myself in a similar situation shortly - I'm going to be
> doing some vacationing in Europe, and will not be able to take my
> laptop with me (it's not mine, it's my employer's).
> 
> Hence, if I need to get into any of my networks here (an emergency),
> I'll have to use said virus-infested public terminals or an internet
> cafe (some keep very good care of their machines, some are total
> festering suckholes of vileness).  Regardless, I will not be able
> to trust my machine of origination.
> 
> In this specific case, I plan on sourcing PuTTY on one of my
> webservers, and using skey for authentication.  For those of you
> that do more of this than I do, is this a reasonable method of
> keeping access into my networks as secure as reasonably possible?

This sounds like a good aproach. Is there some documentation as to how to
set this up.
-- 
U.S. Encouraged by Vietnam Vote - Officials Cite 83% Turnout Despite Vietcong 
Terror 
- New York Times 9/3/1967

Reply via email to