Topic: Passwords

Linux password security: hashing rounds

Password hashing rounds refers to the number of iterations a particular hashing algorithm has to perform. Learn why and how to configure this on Linux systems.

How to disable the usage of the SSH agent

The SSH agent can be used to simplify authentication. As that is not always preferred behavior, we can disable the SSH agent when authenticating.

SSH PasswordAuthentication option

Secure SSH connections and learn about the PasswordAuthentication option, its available values, and how to configure it.

How to test if an account has a password set?

Want to determine if a Linux account has a password set or its related properties? Here are few methods to check this and the steps to perform.

Configure the minimum password length on Linux systems

One of the options to improve password security is by setting a minimum password length. This article explains how to configure and test this security step.

Ubuntu system hardening guide for desktops and servers

Step by step guide to secure any Ubuntu desktop or server. Harden your Ubuntu during installation and afterwards with the available security tips.

File permissions of the /etc/shadow password file

The /etc/shadow file is one of the most important files on Linux. Got an issue with the file permissions of your /etc/shadow password file? Look no further!

Granting temporary access to your servers (using signed SSH keys)

SSH has the capabilities to give a colleague or vendor temporary access to your systems. Learn how to install and configure the related SSH settings.

Create random passwords with OpenSSL/LibreSSL

Generate random passwords with the help of the openssl command using the 'rand' function, often already available on Linux systems.

Password Security with Linux /etc/shadow file

Learn the structure of the /etc/shadow file and what the fields mean. After reading, the file should be less cryptic than it was before.