News

Connect to a Remote Linux Server using SSH. After learning the syntax and options for the SSH command, now it’s time to see how to connect to a remote Linux server using SSH. Use either of the methods ...
In Linux, all password hashes are normally stored using the MD5 hashing algorithm in the /etc/shadow file, but MD5 is algorithmically weak due to collision vulnerabilities.The new recommended ...
Two open-source Secure Shell libraries have pulled support for the Secure Hash Algorithm 1 (SHA-1), used for the past 20 years to verify the integrity of software, digital signatures and other ...
OpenSSH 8.2 announced they are deprecating the ssh key algorithm "ssh-rsa" because it uses a sha-1 hash. sha-1 is has been proven weak. Soon folks will be using such a version of OpenSSH and linux ...