How to Use a Private Key and PuTTY to Log into Your Server Securely

Improve Login Security Using Private Keys and PuTTY

With security becoming increasingly important in today’s modern world of information theft and privacy concerns, keeping your server safe and secure has almost become a necessity. While several methods exist to properly secure your server, from using a long password to two-factor authentication, they can be quite a hassle to set up and use on a day-to-day basis. However, private keys offer a good balance between convenience and security.

Read moreHow to Use a Private Key and PuTTY to Log into Your Server Securely

How to Recover from an Accidental SSH Disconnection on Linux

How to Recover from an Accidental SSH Disconnection on Linux
How to Recover from an Accidental SSH Disconnection on Linux

SSH remains the most common way by which we access our Linux servers. Most people don’t manually log into the server console itself. Through SSH, you can do almost everything except for certain low-level operations. However, this leaves us open to the possibility of disconnection. It might be unexpected but is a very real possibility. A sudden fluctuation on the Internet, a power surge, and your SSH session are immediately terminated. Along with that, any processes that might have been running are typically terminated as well. Not just the ones active, but all the background processes as well. If you were doing something important that shouldn’t be interrupted in the middle – like a complex installation, this can completely mess up your system.

Read moreHow to Recover from an Accidental SSH Disconnection on Linux

How To Set Up SSH Keys on Ubuntu 16.04

How To Set Up SSH Keys on Ubuntu 16.04

We’ll show you how to set up SSH keys on Ubuntu 16.04. SSH or Secure SHELL is the most popular and trusted UNIX-based cryptographic network protocol. It can be used for a secure data communication, remote server logins, remote command execution, and many other secure network services between two networked servers. Normally, password authentication is used to connect to a remote server via SSH but in this tutorial we will show you how to login to your Ubuntu 16.04 VPS using SSH keys. We will generate a key pair (private and public key), place the private key on your server and then use your locally stored private key to gain access to your server. This method provides a more secure way of connecting to your server, instead of just using a password.

Read moreHow To Set Up SSH Keys on Ubuntu 16.04

How to Install and Configure OpenSSH on Ubuntu 16.04

How to Install and Configure OpenSSH on Ubuntu 16.04

In this tutorial we will show you how to install, configure and use OpenSSH on Ubuntu 16.04. SSH (Secure Shell) is a protocol that allows you to access a remote machine securely while OpenSSH is a set of tools based on the SSH protocol. Today we will show you how to install and configure OpenSSH on a Linux VPS using Ubuntu 16.04 as an operating system.

Read moreHow to Install and Configure OpenSSH on Ubuntu 16.04

Secure SSH using two-factor authentication on Ubuntu 16.04

Secure SSH using two-factor authentication on Ubuntu 16.04

In this tutorial, we will describe the necessary steps to configure two-factor authentication (2FA) using Google authenticator on an Ubuntu 16.04 VPS. This application includes implementations of one-time passcode generators for several mobile platforms. This method adds another layer of protection to your server adding an extra step to the basic login procedure.

Read moreSecure SSH using two-factor authentication on Ubuntu 16.04

Change the default SSH port on Linux

change the default SSH port on Linux

Today we’ll show you, how to change the default SSH port on Linux. Changing the default SSH port from the default 22 to another one is one of the first things you should do to secure your Linux VPS. One of the major benefits of changing the default SSH port is to avoid being scanned by the causal port scans.

Thousands of brute-force logins are attempting to gain access to servers around the world trying to login to the default SSH port looking for weak passwords on the default accounts. Some of them will even try to use the usual variants such as port 222 or 2222. If you change the SSH port to a random number, for example, 2569, you will get rid of most of these annoying and sometimes dangerous brute-force attacks. Changing the default SSH port on Linux, is an easy task, carefully follow our tutorial below and you should have it done in less than 10 minutes.

Read moreChange the default SSH port on Linux

Putty Commands

putty commands

With the rise of control panels over the years administering a server has become less challenging for beginners in the wonderful Linux world. You have WHM/cPanel, DirectAdmin, Webmin, ISPConfig, Vesta etc… control panels that ease the server management to a level that everyone will find suitable.

On the other hand, managing a server without control panel knows to be tricky. The server owner must have at least basic understanding and knowledge of Linux administration and commands.

Read morePutty Commands

Connecting via SSH to your server

Connecting via SSH to your server

We’ll show you how to connect your VPS Server via SSH. If you have a new Linux VPS and you are not familiar with the procedure how to manage your server, we will show you few simple steps to connect to it for the first time and to be able to use some of its basic operations. If you are ready, we can start. Connecting via SSH to your server, is an easy task if you carefully follow our tutorial bellow.

Read moreConnecting via SSH to your server

SSH login without password

[et_pb_section bb_built=”1″][et_pb_row][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.1.1″ text_font=”Open Sans||||||||”]

ssh login without password

SSH or Secure SHELL is the most popular and trusted UNIX-based cryptographic network protocol. It can be used for secure data communication, remote server logins, remote command execution, and many other secure network services between two networked servers. Normally, password authentication is used to connect to a remote server via SSH. In this blog tutorial we will show you how to login to a remote Linux VPS without password, using SSH keys. This method is more secure than using a password.

Read moreSSH login without password

How to secure your SSH using two-step authentication on CentOS 6

secure SSH using two-step authentication on CentOSThere are several things you can do to secure and protect your SSH. One of them is to use Google Authenticator and create a two-factor authentication on your CentOS VPS. Google Authenticator gives you an extra layer of security by generating time based one-time passwords (TOTP) on your smartphone that you must enter along with your username and password in order to login to the server via SSH.

Read moreHow to secure your SSH using two-step authentication on CentOS 6