Cybersecurity 101

Uncategorized
No, not a lesson in CyberSecurity.  Just a tale. I was working on setting secure shell (SSH) access to a remote computer from mine.  I've installed Linux on it and have enabled SSH access via RSA keys only.  That's the only real way of doing it properly.  Only allow users to come in (disallowing the root user) via SSH as long as they have the 4096bit RSA key locally on their computer that's registered with the remote computer. I'm using a few years old Watchguard firewall one that I've not had muhc experience with.  I managed to log into it as the administrator and to look at what it would take to get SSH port forwarded to the Linux computer in question. With that Watchguard I was able to set…
Read More