On Thu 08 Jan 2015 at 22:36:46 +0100, Martin Steigerwald wrote: > Am Donnerstag, 8. Januar 2015, 14:20:27 schrieb Jerry Stuckle: > > > Just ensure you're using good security practices - don't allow root > > login, use long, random passwords, etc. I also use a random character > > strings for the login ids, as well as passwords - just one more thing > > for the hackers to have to figure out how to get around. > > Only allow SSH key based logins. Of course, only after you copied a public > key > onto the machine with ssh-copy-id. > > And have SSH keys with *strong* passphrases, to protect against someone > stealing your key. Use ssh-agent wisely only on trusted machines.
SSH password logins are just as safe. 20 characters gives a strong password for use on trusted machines. There is no need to worry about it being stolen because it is in your memory, -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/09012015001632.a7c9236b8...@desktop.copernicus.demon.co.uk