2008/6/10 Nathaniel Homier <nathaniel.homier@bresnan.net>:
The nicknames are a good idea. I can pretend that I am on the Nostromo when
I am using mother. :)
;-)
It would be good idea to re-jig configuration file at son to allow
only key based authentication. This way even ssh log in attacks would
be rebuffed, especially useful in multiuser scenario and chances of
weak password being used.
Flip side is that you can only log in from known machines from where
public key file has been transported through email or physical means
and added to authorized_keys file.