Dec 282013

Article by Alessio bash, first published on his blog

Many security policies require you to change the port number of the SSH service to ensure greater security in a Linux system. Situation now used throughout the IT world and used mostly by users who have their own private server. Today I want to show you how to add another security layer without having to change the SSH port. To do this we’ll incorporate the famous Google Authenticator to our ssh service, in this way we’ll have a safe, two steps security, by entering our password and the combination given from the GA application. Let’s see how to do this… Continue reading »

flattr this!

Apr 252013

Article by Gary Marten

GNU/Linux is one of the most rapidly growing open source operating system as it is consistently improving its capabilities to meet the technological requirements. Initially, Linux was not adopted by most of the users because of its command line interface but later developments in Linux provide ease in terms of accessibility and offered Graphical User-Interface (GUI). As it’s an open source OS, it has one of the largest developer community and one of the most prominent contributors in Linux technology is RedHat. Linux was initially designed for Intel x86 personal computers and then later on modified to support different hardware as well.

Continue reading »

flattr this!