If you have a Linux server, or a computer who can be accessed from the internet by using secure shell, it is good practice to disable SSH root login, this is because most brute force attack try to login to your computer remotely by using the root username, and trying many different passwords until they […]