Changes

Jump to: navigation, search

OPS335 Lab 1

No change in size, 14:07, 13 January 2019
Configuring the SSH Service
===Configuring the SSH Service===
A common (if somewhat blatant ) way) to try to hack into a machine is to try to ssh as '''root''' and brute-force root's password. The root user always exists, meaning the attacker doesn't need to try guessing what user names are on your system. If they can get access to root, they can do anything. To prevent this, we will edit the configuration file for the ssh service to prevent root from ssh'ing into your host machine.
572
edits

Navigation menu