February 28, 2023March 15, 2023 petregmd How to mitigate the SSH dictionary attacks with SSH key-based authentication