Automate the removal of SSH keys which are no longer in use
Please see: http://blog.endpoint.com/2012/01/automating-removal-of-ssh-key-patterns.html