Securing SSH: protocol SSH2 and hiding the direct access of root

Tags: Linux security