Securing SSH servers by restricting only key based authentication. Disallowing password based authentication mechanism to discourage attackers. Limiting the use of ssh keys so that in case key got compromised you still have a second line of defense. Also tells you how to minimize typing by configuring config files for ssh.
Connect to Alok Srivastava on facebook - / alokaryan
Connect to Network NUTS website - http://www.networknuts.net
Connect to Network NUTS facebook page - / networknuts