SSH security improvements: Difference between revisions