How to Secure SSH | Linux Security with HackerSploit
In this series, HackerSploit takes us through a scenario where we’ll have to secure a WordPress instance from SSH based attacks.
Chapters:
0:00 – Intro
1:06 – Project Scenario
2:56 – Creating the Server
8:00 – Disable Remote Root Login
13:30 – Securing Using SSH Keys
22:00 – Disable Password Authentication
New to Linode? Get started here with a $100 credit!
Read the doc for more information on securing your server.
Learn more about getting started with Linode.
Subscribe to get notified of new episodes as they come out.
#Linode #Linux #Security #HackerSploit
Product: Linode, SSH, Linux Security; HackerSploit;