Categories
- Database (7)
- DNS (4)
- Encryption (8)
- Linux Administration (78)
- MacOSX (9)
- Mailserver (11)
- Monitoring (3)
- Multimedia (2)
- Photo (1)
- PHP (7)
- Rescue (4)
- Review (5)
- Security (37)
- Storage (1)
- Uncategorized (1)
- Version control system (16)
- Virtualisation (4)
- Web technologies (8)
- Wordpress (1)
Social Profiles
Facebook
Github
Twitter
Linkedin
Xing
Gravatar
Stackoverflow
Mastodon-
Monthly Archives: March 2014
Restrict SSH login using SSH keys to a particular IP address
Because most passwords are quite short so you can remember them as well as it is annoying to type the password all the time, You might have already considered creating SSH-keys and configured the SSH passwordless login with SSH-key for your server. But how to secure the access with SSH-key? Continue reading
Posted in Linux Administration, Security
Tagged authorized-keys, CentOS, SSH, ssh key
Comments Off on Restrict SSH login using SSH keys to a particular IP address
Secure SSH server access
With a server running, SSH is one of the services nearly instantly gets checked out. Only after a couple of hours of going live with your server, you might already notice someone trying to login with passwords from a dictionary. There are some things you can do to reduce those hacking attempts to your SSH server. Continue reading
Posted in Linux Administration, Security
Tagged CentOS, fail2ban, SSH
Comments Off on Secure SSH server access