SSH Hardening Techniques

linux

SSH Hardening Techniques These are the top practices to harden ssh. In this article I am going to list the best and most important open ssh server security practices. SSH protocol is the best option when it comes to remote login, making backups, remote file transfer and so on. It is a must have on…

How To Use Public Key Authentication Instead Of Password

linux

Password Login Belongs To The Past Public key authentication is an easier and more reliable compared to the old- fashioned password-based login. Keys are basically less prone to brute-force attacks. If you want to force users to use keys add the line in the /etc/sshd/sshd_condig Disable PasswordAuthentication