"If you are using SSH frequently to connect to a remote host,
one of the way to secure the connection is to use a public/private
SSH key so no password is transmitted over the network and it can
prevent against brute force attack.
In Linux, creating a public/private SSH key is easy.
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.