Re: Linux malware attack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Johnny Hughes wrote:

> If you look at page 66 of the PDF, it tells you how to not get infected
> ... don't allow root logins and don't use passwords.

Thanks very much for your prompt response.

I was slightly surprised to see that PermitRootLogin seems to be set to Yes
by default on CentOS (and also on Fedora).

I'm very ignorant of these matters, but what advantage does this give?
Can't I get to the same place by ssh-ing into the remote machine, 
and then su-ing there?


-- 
Timothy Murphy  
e-mail: gayleard /at/ eircom.net
School of Mathematics, Trinity College, Dublin 2, Ireland


_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux