Your question has been posted! Share it with others to increase its visibility and to get it answered quickly. Get the latest tutorials on SysAdmin and open source topics. A question can only have one accepted answer. Are you sure you want to replace the current answer with this one? Hub for Good Supporting each other to make an impact.
What is xRDP?
Get the latest tutorials on SysAdmin and open source topics. Hub for Good Supporting each other to make an impact. Write for DigitalOcean You get paid, we donate to tech non-profits. If your headless, or remote, VPS is visible over the Internet, you should use public key authentication instead of passwords, if at all possible. This is because SSH keys provide a more secure way of logging in compared to using a password alone. While a password can eventually be cracked with a brute-force attack , SSH keys are nearly impossible to decipher by brute force alone. With public key authentication, every computer has i a public and ii a private "key" two mathematically-linked algorithms that are effectively impossible to crack. Key-based authentication is the most secure of several modes of authentication usable with OpenSSH, such as plain passwords and Kerberos tickets.
Installation and setup
If you have a new Linux VPS and you are not familiar with the procedure how to manage your server, we will show you few simple steps to connect to it for the first time and to be able to use some of its basic operations. If you are ready, we can start. Connecting via SSH to your server, is an easy task if you carefully follow our tutorial bellow. SSH is a secure network protocol for data communication between two remote computers. This means you can access your server securely, execute commands securely and manage your server securely. However, in order to connect to your server via SSH you will need to have an SSH client installed on your local computer. On the other hand, if you use Windows as an operating system, you can use free software called Putty to connect to your server. You can download Putty from. Please remember to replace 1. Then, you will need to authenticate yourself so you can connect to your server.
SSH is actually a suite of three utilities - slogin, ssh, and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp. SSH commands are encrypted and secure in several ways. In short, SSH allows you to connect to your server securely to perform Linux command-line operations. To get started, please visit your Server Guide in the Account Center , and make sure you have the following information ready:.