From owner-freebsd-security Thu Jan 20 6:13:38 2000 Delivered-To: freebsd-security@freebsd.org Received: from revelex.com (revelex.com [207.61.176.194]) by hub.freebsd.org (Postfix) with ESMTP id C935014D3F for ; Thu, 20 Jan 2000 06:13:34 -0800 (PST) (envelope-from jonf@revelex.com) Received: from server (nt.revelex.com [10.0.0.9]) by revelex.com (8.9.3/8.9.3) with SMTP id JAA31375 for ; Thu, 20 Jan 2000 09:09:16 -0500 (EST) Message-ID: <007c01bf6359$35a68d50$0900000a@server> From: "Jonathan Fortin" To: Subject: Ssh Date: Thu, 20 Jan 2000 09:15:38 -0600 Organization: Revelex Corp. X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Hi, Well, i *doubt* script kittys will even check the email. but they make remove it in crontab. The best way to have a secure root connection is if you chflags ucgh the autorization key. even if u get hacked it cant be modified. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message