In our continuing series on SSH security practices, today I would like to focus on the dreaded idle user. It might seem like nothing more than an annoyance, but an unattended ssh session can turn into a security risk. The best way to avoid this is to set an timeout …