Popular Self Driving Cars – Open Source Projects

Popular Self Driving Cars – Open Source Projects

The number of open source “self driving cars” projects are growing and all are commendable efforts but also highly ambitious. Over time, the hope is that they will mature enough for us More »

Zorin OS 12.2 Linux Released

Zorin OS 12.2 Linux Released

This week, Zorin OS released the latest upgrade to its popular Linux OS. The Zorin OS 12.2 is designed specifically for Windows users in mind who can migrate to Linux without any More »

Open Source skills are most sought after – Linux Foundation Jobs Report

Open Source skills are most sought after – Linux Foundation Jobs Report

The most sought after category is Developer where a whopping 73% of the employers wanted open source talent More »

4 Git Version Control Alternatives

4 Git Version Control Alternatives

In recent years, Git has become the defacto standard for code management, especially among open source developers. Developed by Linus Trovalds himself, the maker of Linux, it has found a lot of More »

Open Source Entrepreneur – Launching a Project Successfully

Open Source Entrepreneur – Launching a Project Successfully

Being an open source entrepreneur is a long term effort and not just a weekend project. So think hard before you make the jump. More »

 

Tag Archives: ssh

How-to Disable Password Authentication on Linux

This how-to will explain how to disable password based authentication on Linux based systems. It is in continuation of our series on System Security. With the first one published on SSH keys based authentication. We wrote this as a lot of you sent us messages, on social media, to add tutorials on how to secure the server by disabling the password based authentication.

We recommend that the administrator should not attempt to disable password based authentication unless SSH keys are correctly setup and users can easily login using that method.

This is the second article in the series on “Systems Security”. The articles in the System Security series are listed below.

  1. How to setup SSH keys based authentication
  2. How to disable password based authentication (current article)
  3. How to setup UFW Firewall
Techie by day, blogger by night. Love the outdoors, enjoy traveling and building new and interesting things. Follow me if you want to know something.

Howto Login to servers using SSH keys authentication

Using public key authentication is far more secure and smart way to manage server authentication. And it is quite easy to implement and use. Fortunately, unix/linux terminals allow users to create public/private SSH keys combination that can be used to authenticate and login to servers without any hassle.

The traditional SSH authentication using the combination of username/password is good but really not that secure anymore. The passwords can be guessed or even broken using brute force attack. At times even a compromised terminal can give away the passwords to hackers.

This is the first article in the series on “Systems Security”. The complete list of articles in the System Security series are listed below.

  1. How to setup SSH keys based authentication (current article)
  2. How to disable password based authentication
  3. How to setup UFW Firewall
Techie by day, blogger by night. Love the outdoors, enjoy traveling and building new and interesting things. Follow me if you want to know something.