When we create Unix / Linux instances in the cloud (regardless of the provider we usually use), we are asked to use a public / private key set to secure access to the instances. Without this additional protection and only relying on a Login / Password, our systems are vulnerable to dictionary attack...