Securing SSH on Linux Part 2

In this part I will explain how to further improve the server’s security by replacing traditional passwords with public key authentication. Before deciding to follow this tutorial please consider the following problem: While replacing passwords with private/public key pairs is an enormous improvement in security it also requires specially preparing your workstation for logging into…

Continue reading →