Back Solutions
Solutions by
Back About
Back Resources
Back Research
Recommended Mitigation
It is recommended to edit the SSH configuration file (/etc/ssh/sshd_config) and change the ""PermitRootLogin"" field from 'yes' to other allowed argument, according to best practices, in order to secure SSH authentication process
Get a free Security Risk Assessment. Start today