Category: Security

Configure SSH Key-based Authentication In Linux

How To Configure SSH Key-based Authentication In Linux

What is SSH Key-based authentication? As we all know, SSH, also known as Secure Shell, is the cryptographic network protocol that allows you to securely communicate/access a remote system over unsecured network, for example Internet....

Force Users To Use Strong Passwords In Debian, Ubuntu

How To Force Users To Use Strong Passwords In Debian, Ubuntu

A strong password must be comprised of at least 14 characters, including at least one special character, one numerical character, one uppercase and lower case letter. More importantly, passwords shouldn’t be easily predictable and shouldn’t...