> Why?. Why why why why why....
>
> If you're going to trust the untrusted machine anyway running a virus
> run-time environment just google for putty, download and run it.
I find myself in a similar situation shortly - I'm going to be
doing some vacationing in Europe, and will not be able to take my
laptop with me (it's not mine, it's my employer's).
Hence, if I need to get into any of my networks here (an emergency),
I'll have to use said virus-infested public terminals or an internet
cafe (some keep very good care of their machines, some are total
festering suckholes of vileness). Regardless, I will not be able
to trust my machine of origination.
In this specific case, I plan on sourcing PuTTY on one of my
webservers, and using skey for authentication. For those of you
that do more of this than I do, is this a reasonable method of
keeping access into my networks as secure as reasonably possible?
I don't like the idea of logging in from an unknown host, but I
might have to. I'd like to think the above plan is reasonable,
but as always, am open to criticism. :)
Benny
--
"Now, that next spring you find in your garage a creature that
looks like a cross-bred badger and anaconda. A badgerconda."
-- bash.org