@14:00-15:00 you can always run ssh-keyscan and get the administrator of the other machine on the phone before blindly accepting the key. Or use certs. 🙂
@DanLinderАй бұрын
I really hope a later episode will go over the use of certificates as an option to the ssh keys being demonstrated here.
@DanLinderАй бұрын
Hey! Can you go over in s later episode the use of certificates as an option to the ssh keys?
@roberthealey7238Ай бұрын
You can also set the port, and other options, in your .ssh config file so you don’t have to add alias or -p option every time you ssh/ansible/salt/etc.
@v300Ай бұрын
Snort is the port knocking intrusion detection Damon
@andririan6342Ай бұрын
The beard is enough to block any ssh connection attempt