Configuring the SSH protocol to make it more secure