no edit summary
===Part 2: SSH Server Security Configuration===
Any time you configure your computer to allow logins from the network you are leaving yourself '''vulnerable to potential unauthorized access''' by
so called "hackers ". Running the sshd service is a fairly common practice but '''care must be taken to make things more difficult for those hackers that attempt to use "brute force " attacks to gain access to your system. Hackers use their knowledge of your system and many password guesses to gain access '''. They know which port is likely open to attack (TCP:22), the administrative account name (root) , all they need to do is to "guess" the password.<br><br> Making your root password (and all other accounts!) both quite complex but easy to remember is not hard.
The Linux system administrator can
also '''configure the SSH server to make the SSH server more secure'''. Examples include not permitting root login, and change the default port number for ssh.
:'''Perform the following steps:'''