How does SSH authenticate you?
You have a few alternatives.
hostnames (.rhosts file), public-key, s/key, password-prompt, kerberos, smart card.
ditch .rhosts!
s/key: GAME GAG WELT OUT DOWN CHAT
smart card
kerberos (private-key encryption with time-expired tickets)
password prompt: the most common. But don't stop here!
public-key: the cool way.