For SSH to be truly effective, using insecure connection protocols, such
as Telnet and FTP, should be prohibited. Otherwise, a user's password may
be protected using SSH for one session, only to be captured later while
logging in using Telnet.
Some services to disable include:
To disable insecure connection methods to the system, use the command
line program chkconfig, the ncurses-based program
ntsysv, or the
Services Configuration Tool
(redhat-config-services) graphical application. All
of these tools require root level access.
For more information on runlevels and configuring services with
chkconfig, ntsysv, and the
Services Configuration Tool, refer to the chapter titled
Controlling Access to Services in the
Red Hat Enterprise Linux System Administration Guide.