DARKReading: Building an Effective Active Directory Security Strategy (May 19th)
IT - Linux

Many novice users to Linux are surprised to learn that the most secure method to connect to another server with SSH is using keys.

We computer users have been conditioned to use passwords for everything.

It's surprising to learn that there are methods other than passwords, but there is something better: cryptographic keys.

In this tutorial we will learn what SSH keys are and why they are better than passwords. You will learn how to set them up on your computer and how to use them to login with SSH without a password.

See all Archived IT - Linux articles See all articles from this issue