SSH allows the use of encryption keys to be used to allow logging into a system instead of having to remember a plain text password. This is great for use in scripts, and automated tasks, but can be a problem is anyone else ever gets the keys somehow. If the keys become compromised, you must generate new SSH keys. With the increasing use of virtual servers nowadays, if you are creating new servers based on a image file/backup, you may…
Read more [...]
Read more [...]