Surely it weakens security because a single return is often the first thing Evil People will try if they do manage to get a copy of your private key.
If they've compromised the machine running the SSH client you're in trouble regardless of the authentication method used since the Evil Person can just install a key logger and get your passwords that way.
In reply to Re^2: If you do go with ssh..
by adrianh
in thread Connecting to a remote host
by rupesh
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |