How to use this unique method of securing SSH

Posted by Scott_Ruecker on Oct 9, 2021 7:28 PM EDT
TechRepublic; By Jack Wallen
Mail this story
Print this story

The other day I was thinking of ways to secure SSH that were a bit outside the norm. Let's face it, we've all configured SSH in /etc/ssh/sshd_config and /etc/ssh/ssh_config. We've blocked root login, we've set SSH to a non-standard port, we've installed fail2ban, and we've enabled SSH key authentication. What more can we do?

Full Story

  Nav
» Read more about: Story Type: News Story; Groups: Linux

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.