I did not know there was a Google Authenticator module for SSH, very useful and will be trying tthay out on my rpi, thabks! Is yum still used on Cent OS? I know Fedora has superceded/upgraded/replaced it with dnf, which afaik has pretty much the same usage -- most commands work as is, and I think yum is now mapped to use dnf by default.
I am still fairly new to linux and using the terminal, but i have a question for anyone that is willing to take the time and explain. You can limit where root can log on by restricting it to a specific set of terminals. To do this, edit the contents of the /etc/securetty file. All devices you want to allow root to log in from should be listed in the file. How exactly am I supposed to limit my root to one. I would assume this is something automatic as I only have one user on my current machine, but when i view my securetty file, i get an extensive list of tty(1-63) for example. Or does this only apply to the top console section with pam_unix's nullok_secure) :0.0 :0.1 :1 :1.0 :1.1 :2 :2.0 :2.1 :3 :3.0 :3.1 #...
Securing the Console
Local X displays (allows empty passwords
:0