remote_ssh_support
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
remote_ssh_support [2016/04/30 11:39] – lucy | remote_ssh_support [2016/06/14 16:42] – lucy | ||
---|---|---|---|
Line 23: | Line 23: | ||
- | Phishing account | + | **Phishing account** |
The phishing account is a system account. Here is the [[technical_information|link]] that describes the background info (check under accounts).If you want to harden access from remote you can either restrict access in SSH or disable SSH password authentication for that user. | The phishing account is a system account. Here is the [[technical_information|link]] that describes the background info (check under accounts).If you want to harden access from remote you can either restrict access in SSH or disable SSH password authentication for that user. | ||
Line 36: | Line 37: | ||
- | **Warning: | + | **Warning: |
Please note that any changes to the system (changing host file, modifying htaccess etc.) will most likely have an impact on the functionality of LUCY. We cannot give support to systems that have been altered. | Please note that any changes to the system (changing host file, modifying htaccess etc.) will most likely have an impact on the functionality of LUCY. We cannot give support to systems that have been altered. | ||
remote_ssh_support.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1