One way to encrypt your files is via the public/private key. Let’s take a look at the public key encryption concept to understand how it can protect you.
Previously, I showed you the way to generate a public/private SSH key so you can connect to your remote host securely. The method that we used is via the terminal, which can be rather unfriendly (and scary) to the Linux newbies. Here is an easier method of setting up your public/private SSH key, with a […]
If you are using SSH frequently to connect to a remote host, one of the way to secure the connection is to use a public/private SSH key so no password is transmitted over the network and it can prevent against brute force attack.