ssh

How To Setup SSH Keys on CentOS 8

centos-logo

In this tutorial we will show you how to setup SSH Keys. For those of you who didn’t know, Secure Shell (SSH) is a cryptographic network protocol designed for a secure connection between a client and a server. Generally, there are two ways for clients to access their servers – using password based authentication or public key based authentication. Using SSH keys for authentication is highly ...

How To Secure SSH Using Two Factor Authentication on Ubuntu 16.04 LTS

terminal-linux-logo

In this tutorial, we will show you how to secure SSH using two-factor authentication on Ubuntu 16.04 LTS. For those of you who didn’t know, Securing SSH with two-factor authentication using Google Authenticator Two-step verification (also known as Two-factor authentication, abbreviated to TFA) is a process involving two stages to verify the identity of an entity trying to access services in ...

How To Disable Root SSH Access on CentOS 7

terminal-linux-logo

In this tutorial, we will show you how to disable root SSH access on your CentOS 7. By default when you install CentOS 7 and SSH server, the root account automatically has remote access via SSH. This can be dangerous. If the root account password falls into the wrong hands, your server is at the mercy of the bad guys with the password. They can delete every file and folder on the server and take...

How To Change SSH Port in Ubuntu

terminal-linux-logo

In this tutorial, we will show you how to change ssh port on the Ubuntu system. For those of you who didn’t know, SSH is a program and protocol for securely connecting to remote machines across a network. It allows you to run programs, and do a variety of tasks as if you were sitting at the machine. SSH is very similar to telnet except it is with encryption to protect the transferred informati...

How To Change SSH Port in CentOS

centos-logo

In this tutorial, we will show you how to change the default ssh port on CentOS system. For those of you who didn’t know, SSH is a program and protocol for securely connecting to remote machines across a network. It allows you to run programs, and do a variety of tasks as if you were sitting at the machine. SSH is very similar to telnet except it is with encryption to protect the transferred i...

How To Replacing OpenSSH With Dropbear on CentOS

centos-logo

In this tutorial, we will show you how to replacing OpenSSH with Dropbear on CentOS. For those of you who didn’t know, Dropbear is a relatively small SSH server and client. It runs on a variety of POSIX-based platforms. Dropbear is open source software, distributed under an MIT-style license. Dropbear is particularly useful for "embedded"-type Linux (or other Unix) systems, such as wireless ...