Instead of a hacker needing your password, they need to get both your SSH private key and the SSH key’s password.Īny Linux or macOS computer can generate SSH keys using steps I’ll cover WIndows computers need a similar process. Using SSH keys is more secure than using a password, with either SFTP (secure FTP, the data is encrypted) or the terminal. You can use SSH keys to connect with Terminal to your hosting account, and also to connect with SFTP programs like FileZilla.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |