Security

SSH Public Key Authentication

Public SSH key authentication is an SSH authentication method that allows users to use cryptographically generated keys to log into remote servers. SSH keys are more secure than raw passwords and provide a much more efficient way of logging into SSH. SSH keys are automated, and once authorized, do  […]

Continue reading

Access Control Lists(ACL) in Linux

What is ACL ? Access control list (ACL) provides an additional, more flexible permission mechanism for file systems. It is designed to assist with UNIX file permissions. ACL allows you to give permissions for any user or group to any disc resource. Use of ACL : Think of a scenario in which a  […]

Continue reading

Page top