I've been reading the thread about detecting hack attempts and I am interested in in setting up "key based authentication" as described [perhaps] in "https://docs.fedoraproject.org/en-US/Fedora/14/html/Deployment_Guide/s2-ssh-configuration-keypairs.html";

In doing this is their danger of making an error and locking myself out of my computer, if so what to avoid? I've made some catastrophic errors in the not very distant past that required a new system re-installation and would prefer not repeating that.

Suggestions, thoughts?

Bob

--
Bob Goodwin - Zuni, Virginia,
Fedora Linux-31 XFCE
_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org

Reply via email to