Forgot username/password? Don't have an account?
Login with Facebook
Home » Courses » Securing a Linux Server » Securing our User from Attacks with Public and Private Keys
Subscribe for updates.
* New to us? log in with Facebook and get a free day pass

Securing our User from Attacks with Public and Private Keys

The idea behind public and private keys is removing the need for passwords. It automates the process of logging in but more then that it makes it literally impossible to hack into the key because its a lot more complex then what we can type on our own. The only weakness of the key is if someone has direct access to our private/public keys. In the next few lessons we will see how to create a private/public key on mac and windows.
Got A Question?

'I love being Prime'

Have a question but don't want to ask it publicly? If you are a prime member just ask right here and we will get back to you within 48 hours. Not prime yet? no worries you can ask publicly below.

Act now while we have available seating

Our on line school is private, affordable and interactive with trainer support.
Act now save your seat before someone else takes yours.
Act now