Securing Your Asterisk Server, Part 2 - page 2
Locking Down OpenSSH
A second way to tighten up remote SSH access is to use public-key authentication.
This protects your system passwords because you authenticate with a cryptographic
key, instead of using a login/password. (See Resources to learn how to do this.) In addition to disabling root logins, you should also
disable password authentication with this line in
Now you can sit back and laugh at brute-force SSH attacks, because they simply won't work.
Solid state disks (SSDs) made a splash in consumer technology, and now the technology has its eyes on the enterprise storage market. Download this eBook to see what SSDs can do for your infrastructure and review the pros and cons of this potentially game-changing storage technology.
- 1Linux Top 3: GNOME 3.12 and New Betas for Ubuntu 14.04 and OpenMandriva Lx 2014.0
- 2Linux Top 3: Linus Lashes out, Linux 3.14 Gets PIE and Ubuntu One is Done.
- 3Linux Top 3: Ubuntu 14.04, Debian Gives Squeeze More Life and Red Hat Goes Atomic
- 4Linux Top 3: RHEL 6.5, Debian 7.2 and EOL for Linux 3.0.x
- 5Linux Top 3: CoreOS, Oracle Enterprise Linux 7 and Ubuntu 14.10