If your granting him limited access lock him from going outside his home
directory tree. Enable auditing, look at the logs from time to time. Recent
versions of sshd can restrict to a IP/range. A few to.start with.
On Jul 4, 2014 6:35 PM, "Keith Lofstrom" wrote:
> Question?
>
> Without getting in
Steve:
I left the old gcc 4.8.1 on the drive, and did not force any removal.
Yast2 software management on openSuse seems to run slightly faster than my
old synaptics on Ubuntu.
___
PLUG mailing list
PLUG@lists.pdxlinux.org
http://lists.pdxlinux.org/mailm
And if you're Cisco, you also embed your private key in the firmware of
your VoIP product line so you don't lose it. Just in case you wanted a
really easy backdoor for the entire platform shipped with every piece of
hardware. Security is important!
(;
On Jul 6, 2014 10:31 AM, "Russell Johnson" w
On Jul 4, 2014, at 8:38 PM, Russell Senior wrote:
> The main thing is that you are sure you have the right public key.
> So, you could pipe the public key through sha512sum or something and
> recite the hash over the phone to be sure it's the same at both ends.
> The public key doesn't need to b