[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: how to find trace of attacks



Koh Choon Lin wrote:
> I think he meant he uses ssh on his laptop to login to a server somewhere else.
>   

For that only the ssh client is needed, not the server. If that's the
case, the server can be disabled/purged and that will prevent any
possible attacks on sshd.

-- 
To be great is to be misunderstood.
		-- Ralph Waldo Emerson

Eduardo M KALINOWSKI
eduardo@kalinowski.com.br
http://move.to/hpkb


Reply to: