Explore >> Select a destination


You are here

monicalent.com
| | www.sethvargo.com
6.5 parsecs away

Travel
| | With many popular websites providing two factor authentication, why shouldn't you add two-factor authentication to SSH? Public-key, Private-key encryption is generally considered to be very secure, but why not take an extra step?
| | functionallyparanoid.com
10.7 parsecs away

Travel
| | As I continue to learn how to secure my various "things", I'm getting more and more of a fan of physical two factor authentication that doesn't involve sending six digit codes over the public SMS network. As such, I've been playing around with the YubiKey 5 NFC device, a little USB second factor that costs
| | blog.0xbadc0de.be
17.9 parsecs away

Travel
| | [AI summary] The provided text is a detailed article on best practices for securing SSH (Secure Shell) configurations and usage. It covers various aspects such as using SSH certificates, LDAP integration, avoiding passwordless private keys, and implementing multi-factor authentication (MFA). The text also includes discussions on smart cards, FIDO U2F, and tools for managing SSH keys. There are comments from readers discussing related topics like full disk encryption, key revocation, and tools like `whosthere` for capturing SSH public keys. The article is part of a blog post and includes links to external resources and other blog posts.
| | bpohoriletz.github.io
30.2 parsecs away

Travel
| Time: 20-30 min Level: Intermediate/Advanced Code: GitHub Reference: The Modular Monolith: Rails Architecture - Dan Manges