Password less SSH authentication is one of the best security practices to avoid any password expose to attacke SSH is secure authentication mechanism, however Man-in-the-middle attack (MITM), Brute force attack these attack can expose password to the attackers. We need two components to make a ssh key working. Public Key, …
Read More »Secure SSH using Google Authenticator
Secure SSH using Google Authenticator There are several things you can do to secure SSH login. One of them is to use Google Authenticator and create a two step authentication on your CentOS VPS. Google Authenticator gives you an extra layer of security by generating time based one-time passwords (TOTP) …
Read More »