Explore >> Select a destination


You are here

www.cricalix.net
| | colincogle.name
3.2 parsecs away

Travel
| | SSH is easy to secure, but that doesn't mean there isn't more work to be done.
| | dgl.cx
2.5 parsecs away

Travel
| |
| | www.sethvargo.com
2.2 parsecs away

Travel
| | With many popular websites providing two factor authentication, why shouldn't you add two-factor authentication to SSH? Public-key, Private-key encryption is generally considered to be very secure, but why not take an extra step?
| | golb.hplar.ch
34.1 parsecs away

Travel
| [AI summary] The user has followed a comprehensive guide to secure and configure their VPS server. They have successfully set up SSH with key-based authentication, disabled root login, configured a firewall, and set up a non-root user for system management. The guide also covers changing the SSH port, disabling SSH protocol 1, and setting up SSH agent for passwordless login. The user is now ready to deploy additional services and applications on their secure server.