Linux Security: Disable password-based authentification
There is one good practice when it comes to secure access to your server - ssh key-based authorization.
See how to configure ssh key-based authorization in a separate post.
Once ssh access is configured, you should disable password-based authentifica...
denys-skvortsov.hashnode.dev1 min read