Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
Legion
on May 20, 2011
|
parent
|
context
|
favorite
| on:
Secure your Linux server - HowTo by the NSA
Yes, you do have to take the KVM over IP device's security into account, like any other remote service you expose. It's the same set of problems you face with securing your other encrypted remote login (SSH) with similar solutions.
Consider applying for YC's Spring batch! Applications are open till Feb 11.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: