How To: TOTP 2FA Linux SSH Using Google-Authenticator
Using only a username and password for authentication is no longer secure. With user-database dumps reaching millions of exposed, albeit hashed and salted, passwords. Secure authentication should include not only…