LowEndBox - Cheap VPS, Hosting and Dedicated Server Deals

Generating and Using SSH Keys, Part 1

Tags: , , , , Date/Time: September 12, 2020 @ 6:58 am, by raindog308

Traditionally, authentication in Unix-based systems is done with passwords.  This tests “something you know”.  SSH keys offer a higher level of security by adding “something you have”- in this case, an SSH private key file.   Even if an attacker was to guess your SSH passphrase, without the SSH private key file, this knowledge is […]