Is the overhead of such tools, and added attack surface, justified over sshing and issuing a shutdown command though?
What kind of attack are you anticipating? Surely only a fool or a madman would make such a thing publicly accessible.
You can just run it via ssh anyway....
What kind of attack are you anticipating? Surely only a fool or a madman would make such a thing publicly accessible.