Secure Login

In a multiserver Linux environment, there’s a good chance that you won’t be physically located near any of the Linux servers. To access the servers, you need to utilize some type of remote access software.

In years past, the Telnet protocol provided the simplest way to interact with the server using a command prompt across the network. Unfortunately, this protocol sends data as plain, unencrypted text, making it easy for an attacker to snoop on your connection and gain valuable information.

These days, all systems support the Secure Shell (SSH) login for remote access. The SSH login uses encryption keys to encrypt the network session traffic between the client and the server, making it more difficult for attackers to snoop.

The ...

Get Linux Fundamentals, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.