We need to do some basic security when we have a VPS or server that has a Linux system open.
There are probably several areas:1. Prohibit root account ssh, use custom account ssh;This way, the hacker must first guess the account number, then can
We need to do some basic security when we have a VPS or server that has a Linux system open.
First, turn off the SSH password login
First, you need to have your own SSH Key, if you use the Windows system, you can use the Putty under the Puttygen.
first, close the SSH password loginFirst of all, you need to have your own SSH Key, if you use Windows system, you can use Putty under the PUTTYGEN. EXE generates a private key and a public key.The first step is to run PUTTYGEN. ExeIn general, we
Article 1:http://blog.sina.com.cn/s/blog_5063e4c80100sqzq.htmlFirst, install the necessary client1. TortoisegitHttp://tortoisegit.googlecode.com/files/TortoiseGit-1.0.2.0-32bit.msiAfter downloading the installation, restart the system.2. Installing
First of all, this part of the content for Linux Beginners is not particularly important, you can skip this chapter, first learn the next chapter, and then come back to see this chapter after learning . Linuxare mostly applied to servers, and
PUTTY does not support remembering passwords by default. It is not recommended to use the modified version. Fortunately, SSH supports certificate login. I also asked my friends in the production environment that they also use certificates when
OpenBSD uses a key to remotely connect to the server-Linux Enterprise Application-Linux server application information. The following is a detailed description. After OpenBSD4.1 is installed, the RSA key and password are used for remote logon over
Article Title: Build a Secure SSH server in the Centos5 environment. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open
In fact, there are many vulnerabilities in the original SSH server settings, but network administrators generally like this default setting and think that everything is okay as long as the root password is saved. When I used to integrate with
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.