On Tue, Sep 27, 2005 at 09:39:56PM -0500, C. Bensend wrote: > > Why?. Why why why why why.... > > > > If you're going to trust the untrusted machine anyway running a virus > > run-time environment just google for putty, download and run it. > > I find myself in a similar situation shortly - I'm going to be > doing some vacationing in Europe, and will not be able to take my > laptop with me (it's not mine, it's my employer's). > > Hence, if I need to get into any of my networks here (an emergency), > I'll have to use said virus-infested public terminals or an internet > cafe (some keep very good care of their machines, some are total > festering suckholes of vileness). Regardless, I will not be able > to trust my machine of origination. > > In this specific case, I plan on sourcing PuTTY on one of my > webservers, and using skey for authentication. For those of you > that do more of this than I do, is this a reasonable method of > keeping access into my networks as secure as reasonably possible?
This sounds like a good aproach. Is there some documentation as to how to set this up. -- U.S. Encouraged by Vietnam Vote - Officials Cite 83% Turnout Despite Vietcong Terror - New York Times 9/3/1967