Generating and Using SSH Keys, Part 1
Traditionally, authentication in Unix-based systems is done with passwords. This tests "something you know". SSH keys offer a higher level of security by adding "something you have"- in this case, an SSH private key file. Even if an attacker was to guess your SSH passphrase, without the SSH private key file, this knowledge is not sufficient to allow him to login. This tutorial will walk you through creating an SSH key...
Read More