Рет қаралды 737
In this video we are going to look how we can make our ssh logins a little more secure against automated attacks and prevent some brute forcing.
SSH is commonly used to login to remote servers, but but we are going to change some things in the configuration for that. With those config changes you are minimising the attack vector of automated attacks a little, but there is no guarantee that you are safe :)
Remember to always use strong passwords!
- Disable root login
- Enable SSH key authentication
- Disable password login
Disclaimer: The is no guarantee that your system is secure. Do your research about it and see what fits most for you.
🔗 My links:
github.com/marcogreiveldinger
marco-greiveldinger.de
techwithmarco.com
Support me at Patreon: / techwithmarco
00:00 -- Introduction
01:20 -- What we will do
02:01 -- Create a new lower privileged user
05:24 -- Create a new ssh key
08:03 -- Upload the public key to the remote server
10:24 -- Disable root login and paassword login
13:13 -- Outro
#ssh #sshd #sshserver #sshsecurity #linux #security #cybersecurity