Double Check
Desktop login normally requires only a username and password, and both are often easy to guess. For better protection, you can implement two-step authentication using a PAM module and a free mobile app.
|
Geminess, 123RF
Desktop login normally requires only a username and password, and both are often easy to guess. For better protection, you can implement two-step authentication using a PAM module and a free mobile app.
The usual desktop login using a username and password provides some rudimentary security against unauthorized access, but it's not always enough. Users often use weak passwords and even write them on a sticky note placed on their monitor. You don't need to be a security expert to realize that unauthorized logins under such circumstances are not that hard.
Other authentication methods that provide an additional step are much more secure. One approach is generating unique one-time-use tokens – password-like strings – that provide an extra level of security. The computer requests the one-time password (OTP) at login together with the other credentials.
The secret is that only an authorized user has access to the one-time token. Unauthorized third parties (e.g., colleagues) can't get the OTP and, therefore, cannot log in. These methods are also referred to as two-factor, or two-step, authentication.
[...]
Pages: 3
In this issue, we take a look at some helpful publishing tools and then get serious about online privacy.
Managing multiple computers can often be accomplished just by using SSH, etc. You don't necessarily need to have a big, complex solution like Puppet or Cfengine.
Ellen Ko of Google's Open Source Team announces the creation of a new Google YouTube channel, googleOSPO, created to house all the Google and open source related videos in one place.
A wireless LAN is easier to set up than a cable LAN but is significantly less secure. A RADIUS server can change that.
© 2025 Linux New Media USA, LLC – Legal Notice