Brief about SSH Keys.

For optimal security, it is recommended that you use SSH Keys for logging into SSH, rather than passwords.  Using SSH Keys makes it harder for a potential intruder to try to access your account or snoop or interfere with your connection.

You can setup SSH Keys via the Terminal program built into Linux or Mac OS X.  For Windows, you will need to use a third-party program such as PuTTY, which can be downloaded for free.

Once you setup SSH Keys, you can disable password authentication so that the server only accepts sessions from people with an authorized key.

  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

My PHP scripts produce Internal Server Errors (500 error)

Some of our servers run PHP scripts as your own user instead of the global web server user. PHP...

PHP Sample Form mailer

Question: Where can I get sample php-form-mail script (form to email) script ? <!-- /*...

How can I view my client's web site before the domain propagates?

Since the client's account is sharing an IP with other sites, you have to use the ~account method...

How to use Entropy Search

This script enables a nice, quick search engine that can help your visitors find information that...

How to check server status?

http://www.trafficpullz.com/serverstatus/This will indicate to you whether a server or service,...