Popular Open Source 3D Printers

Popular Open Source 3D Printers

Just a decade ago, 3D printers were a novelty. Costing upwards of US$5,000 for a desktop edition that could convert some powder into plasticky objects. But not only have the prices fallen, More »

Open Source Gift Ideas for the Holiday Season

Open Source Gift Ideas for the Holiday Season

It is the holiday season and a time to share and exchange presents. And what better way to share some love this holiday season than by giving your loved ones an open More »

Wekan – Open Source Alternative to Trello

Wekan – Open Source Alternative to Trello

Wekan is an open source collaborative project management tool similar to Trello like boards. It offers some of the Kanban functionalities and features as well. On Wekan one can easily create boards, More »

The Zero Terminal – Pocket Computer that works!

The Zero Terminal – Pocket Computer that works!

The real joy of tinkering with Raspberry Pi is to build something nifty and fun. To hack a really whacky and crazy idea into a working prototype. That we all love and More »

OpenAg – Open Source Food Computer

OpenAg – Open Source Food Computer

MIT Open Agriculture (OpenAg) is a wonderful execution of an open source initiative for controlled-environment agriculture platform referred to as “Food Computer”. All hardware, software and even data is open sourced so More »

 

Tag Archives: authentication

How-to Disable Password Authentication on Linux

This how-to will explain how to disable password based authentication on Linux based systems. It is in continuation of our series on System Security. With the first one published on SSH keys based authentication. We wrote this as a lot of you sent us messages, on social media, to add tutorials on how to secure the server by disabling the password based authentication.

We recommend that the administrator should not attempt to disable password based authentication unless SSH keys are correctly setup and users can easily login using that method.

This is the second article in the series on “Systems Security”. The articles in the System Security series are listed below.

  1. How to setup SSH keys based authentication
  2. How to disable password based authentication (current article)
  3. How to setup UFW Firewall

Techie by day, blogger by night. Love the outdoors, enjoy traveling and building new and interesting things. Follow me if you want to know something.

Howto Login to servers using SSH keys authentication

Using public key authentication is far more secure and smart way to manage server authentication. And it is quite easy to implement and use. Fortunately, unix/linux terminals allow users to create public/private SSH keys combination that can be used to authenticate and login to servers without any hassle.

The traditional SSH authentication using the combination of username/password is good but really not that secure anymore. The passwords can be guessed or even broken using brute force attack. At times even a compromised terminal can give away the passwords to hackers.

This is the first article in the series on “Systems Security”. The complete list of articles in the System Security series are listed below.

  1. How to setup SSH keys based authentication (current article)
  2. How to disable password based authentication
  3. How to setup UFW Firewall

Techie by day, blogger by night. Love the outdoors, enjoy traveling and building new and interesting things. Follow me if you want to know something.