February 2020
Intermediate to advanced
666 pages
15h 45m
English
A few years ago, there was a somewhat celebrated case where malicious actors had managed to plant malware on quite a few Linux servers somewhere in southeast Asia. There were three reasons that the bad guys found this so easy to do:
All this meant that it was easy for Hail Mary to brute-force its way in.
Different distributions have different default settings for root user login. In the /etc/ssh/sshd_config file of your CentOS machine, you'll see this line:
#PermitRootLogin yes
Unlike what you ...
Read now
Unlock full access