What is SSH? And how to protect root ssh (part 1)


SUBMITTED BY: teewaweth

DATE: May 21, 2017, 4:13 p.m.

FORMAT: Text only

SIZE: 929 Bytes

HITS: 402

  1. What is SSH? And how to protect root ssh
  2. SSH (Secure Shell)
  3. SSH (Secure Shell) is a Network Protocal that can exchange secure channel data between two network devices. Linux or Unix is ​​the basic system for accessing the account (Shell Accounts). SSH was designed to replace Telnet, Rlogin, RSH (The remote shell) for security reasons. Transmission is in a form of encrypted (Plaintext) data so that the information is confidential and can be transmitted over the Internet. (Applications) are available on UNIX, Microsoft Windows, Apple Mac and Linux applications. (Applications)
  4. SSH (Secure Shell)
  5. Example of using SSH through PuTTY in Microsoft Windows 7
  6. From: http://www.sutenm.com
  7. Root ssh protection on centos
  8. How to Set SSH to not allow root login
  9. Today, the basic security of linux.
  10. That is, not to Root Access directly, but through other users.
  11. Let's see how better.
  12. Follow the next part 2.

comments powered by Disqus