In this tutorial I continue to build on what we learnt in part one and show you some more advanced features of the SSH command.
I cover the following:
1) Easily append additional public keys to an existing authorised_keys file
2) Add a password to the private key on a remote machine
3) Prevent users logging in with a password, thus explicitly requiring keys to be setup to allow log-in
4) Use of X-forwarding to enable graphical window programs to be used over an SSH connection.