SSH Secure Cell

SSH Secure Cell

1. Make Password Auth Stronger

2. Fix Too Many Authentication Failures

3.Use Public Key Authentication

4.Disable Password Logins after verification

Public Key Authentication

Public Key authentication is stronger than password authentication as its immune to brute-force password attacks, but it’s less convenient because it relies on RSA key pairs. To begin, you create a public/private key pair. Next, the private key goes on your client computer and then you copy the public key to the remote server that you want to log into. You can log in to the remote server only from computers that have your private key. Your private key is just as sensitive as your house key anyone who has possession of it can access your accounts. You can add a strong layer of protection by putting a passphrase on your private key.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Society of AI

Society of AI

77 Followers

Society of AI has an vision to educate people how Artificial Intelligence can change their life!