LowEndBox - Cheap VPS, Hosting and Dedicated Server Deals

Generating and Using SSH Keys, Part 3

In previous tutorials in this series, we went over generating SSH keys and how to use them.  We'll wrap up the series by showing you how to turn off password authentication on your server. Why Configure for SSH Key Authentication Only As mentioned in Part 1, SSH key authentication requires both "something you know" (the passphrase) and "something you have" (the SSH private key file).  Some attacker on the other side of th...

Read More
Generating and Using SSH Keys, Part 3

Generating and Using SSH Keys, Part 1

Traditionally, authentication in Unix-based systems is done with passwords.  This tests "something you know".  SSH keys offer a higher level of security by adding "something you have"- in this case, a...

Read More
Generating and Using SSH Keys, Part 1

Latest LowEndTalk Hosting Offers

View More