Take Back the Darknet (Part 4)
Part 4 - Hardening Your Pi Hardening, important for the sake of reducing attack vectors! First off we’ll create a new user and then delete the “pi” user that comes preinstalled. Log back in via SSH / Terminal / PuTTY ssh pi@xxx.xxx.xxx.xxx Think of a new username. Could be your...
Continue reading