SSH Remote Access NO Port-Forwarding NO Cloudflare

In this article I will show you how I securely connect to my remote machines without having to configure port forwarding. Requirements: A computer “server” (running linux) A internet connection Another computer to connect to your server (running linux) Why? If you want to access your server without portforwarding in a extremely secure fashion you will want to follow this tutorial. You will be connecting to the server via tor which will make it harder for anyone to find the url of the server and ill show you how to setup keybased auth for even more security!...

October 4, 2023 467 words 3 min

Securing ssh with Key-Based authentication

SSH keys provide an extremely secure way of logging into your server. SSH Password Based VS Key Based Authentication Clients can be authenticated by an SSH server in a variety of ways. The most basic is password authentication, which is simple to use but not particularly secure. The more advanced and secure way is via ssh keys.Brute-forcing a password-protected account is quite possible thanks to modern computing power and automated scripts....

How SSH works

If you work in the IT industry, you’ve undoubtedly heard of ssh. But how does it work? SSH (secure shell) is a network protocol that allows two computers to connect securely over the internet. SSH uses encryption to prevent hackers from reading data sent between two connected devices. SSH is divided into three layers: The transport layer The connection layer The authentication layer During and after authentication, the transport layer establishes safe and secure communication between a client and a server....

February 25, 2023 889 words 5 min