mycyberuniverse.com
Creating public/private key authentication for SSH
If you use ssh to connect to the remote host, one way to ensure the security of the connection is the use of public/private SSH key, because password is not passed across the network and the system is resistant to attacks by “brute force”.
Arthur