During the installation phase there is an extra user account created other than root.
Since I use SU to stop brute force attacks through SSH I have chosen this user to do SSH. But apparently that account can traverse the file structure. Questions:
- Does using that user for SSH create a security hole?
- Can/should I restrict this user's permissions and in what way?
- Should I create another user?