>       Why?. Why why why why why....
>
>       If you're going to trust the untrusted machine anyway running a virus
> run-time environment just google for putty, download and run it.

I find myself in a similar situation shortly - I'm going to be
doing some vacationing in Europe, and will not be able to take my
laptop with me (it's not mine, it's my employer's).

Hence, if I need to get into any of my networks here (an emergency),
I'll have to use said virus-infested public terminals or an internet
cafe (some keep very good care of their machines, some are total
festering suckholes of vileness).  Regardless, I will not be able
to trust my machine of origination.

In this specific case, I plan on sourcing PuTTY on one of my
webservers, and using skey for authentication.  For those of you
that do more of this than I do, is this a reasonable method of
keeping access into my networks as secure as reasonably possible?

I don't like the idea of logging in from an unknown host, but I
might have to.  I'd like to think the above plan is reasonable,
but as always, am open to criticism.  :)

Benny


-- 
"Now, that next spring you find in your garage a creature that
looks like a cross-bred badger and anaconda. A badgerconda."
                                                  -- bash.org

Reply via email to