> Why?. Why why why why why.... > > If you're going to trust the untrusted machine anyway running a virus > run-time environment just google for putty, download and run it.
I find myself in a similar situation shortly - I'm going to be doing some vacationing in Europe, and will not be able to take my laptop with me (it's not mine, it's my employer's). Hence, if I need to get into any of my networks here (an emergency), I'll have to use said virus-infested public terminals or an internet cafe (some keep very good care of their machines, some are total festering suckholes of vileness). Regardless, I will not be able to trust my machine of origination. In this specific case, I plan on sourcing PuTTY on one of my webservers, and using skey for authentication. For those of you that do more of this than I do, is this a reasonable method of keeping access into my networks as secure as reasonably possible? I don't like the idea of logging in from an unknown host, but I might have to. I'd like to think the above plan is reasonable, but as always, am open to criticism. :) Benny -- "Now, that next spring you find in your garage a creature that looks like a cross-bred badger and anaconda. A badgerconda." -- bash.org