Find the answer to your Linux question:
Page 2 of 2 FirstFirst 1 2
Results 11 to 12 of 12
Enjoy an ad free experience by logging in. Not a member yet? Register.
  1. #11
    Just Joined!
    Join Date
    Aug 2005
    Location
    South West England
    Posts
    91

    If you like, you can turn off straight passwords and have both at once or nothing...
    Just enter a password when the ssh-keygen program prompts you for a password. I usually don't, as I feel it's secure enough... and easier not to have to, but you have the option.

    Some handy ssh-keygen options:
    -t rsa1 / rsa / dsa (selects key type, rsa is default, is fine mostly)
    -b xxxx (sets number of bits, 768 (weaker) to 4096 (paranoid), 2048 is default)

    For more, type "ssh tutorial" into Google, or "man ssh" into terminal.
    Then you will find out all sorts of things, eg port forwarding to bypass firewalls

    Cheers
    Dan

  2. #12
    Also keep your kernel updated as much as you can, the attacker could have used an exploit which attacks the kernel, gains root, and he could've just done an rm -rf /*

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •