This article is a follow-up to my earlier article on SSH security considerations, in which I discussed some very real risks with SSH
Safari has some excellent online books available that cover the VPN aspects in much more depth than I can address in this space, as well as supplemental articles and other resources that can help you to better understand how SSH works and how to create the ultimate SSH technical security plan. This article will help the UNIX administrator

The link for this article located at InformIT is no longer available.