1. Manage users - Every server has a root user who can execute any command. Because of the access level it has, the root can be hazardous if a server falls into the wrong hands. It is a widespread practice to disable the root login for ssh altogether.since the root user has the most power,hackers focus their attention on trying to crack the root password. When you disable this user entirely, you put attackers at a disadvantage and protect the server from potential threats.
No comments:
Post a Comment