Howtos / Articles

Generate SSH Keys on Windows with PuTTYGen (the PuTTY Key Generator)

To generate SSH public and private key pairs on Windows, one of the easiest tools to use, is the PuTTY Key Generator “puttygen.exe” (which can be downloaded from here). The resulting generated files from the PuTTY Key Generator can be used to set up public key authentication with a remote server, allowing for more secure authentication over normal password based authentication (requires disabling password based authentication). Download the PuTTY Key Generator You can download puttygen from the following url: https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html…

Read more [...]

Using SSH Private Key Files with PuTTY

The following guide shows you how to log into a remote server using your private key file. It assumes you already have the associated public key already added into the remote hosts authorized_hosts file. Download PuTTY Download PuTTY if you don’t have it installed yet. You can download PuTTY from the following url: https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html Open PuTTY Run Putty. You should be presented with a screen like this: Enter in the host name or IP address of the host you want…

Read more [...]

Generate SSH Public and Private Keys on Linux

SSH allows for both password based authentication, as well as public key authentication. Public key authentication is generally regarded as being more secure, as it isn’t as prone to brute force login attempts (if you disable password based authentication). The private key can also have a passphrase associated with it, which makes public key authentication even more secure if needed. Sometimes cloud servers will let you put a public key in as a authorized authentication key when the cloud server…

Read more [...]

Generate new SSH keys

SSH allows the use of encryption keys to be used to allow logging into a system instead of having to remember a plain text password. This is great for use in scripts, and automated tasks, but can be a problem is anyone else ever gets the keys somehow. If the keys become compromised, you must generate new SSH keys. With the increasing use of virtual servers nowadays, if you are creating new servers based on a image file/backup, you may…

Read more [...]

How To Change The SSH Server Port Number

Changing the port number that your SSH server listens on is a simple way to prevent random brute force login attacks against your server. While people can still perform attacks against SSH running on a different port number, most automated tools will default to port 22, and not actually do a full port scan. Any port number can be used, as long as it is not already in use by another service. Note: Make sure you are logged in as…

Read more [...]



Page 1 of 212