Securing Your Linux System with Advanced SSH Configuration

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 5

  • @declanmcardle
    @declanmcardle 2 дня назад +1

    @14:00-15:00 you can always run ssh-keyscan and get the administrator of the other machine on the phone before blindly accepting the key. Or use certs. 🙂

    • @DanLinder
      @DanLinder День назад +1

      I really hope a later episode will go over the use of certificates as an option to the ssh keys being demonstrated here.

  • @DanLinder
    @DanLinder День назад +1

    Hey! Can you go over in s later episode the use of certificates as an option to the ssh keys?

  • @andririan6342
    @andririan6342 8 часов назад

    The beard is enough to block any ssh connection attempt

  • @v300
    @v300 15 часов назад

    Snort is the port knocking intrusion detection Damon