One tool to help you manage your secure shell connections is the GNOME SSHmenu tool. This helpful application adds a small applet to the GNOME panel that allows you to make secure shell connections with a single click.
Read more »Manage your secure shell connections from the GNOME panel
Category: High End Tags:
- Login to post comments
Restricting SSH logins to specific groups on Ubuntu
On Ubuntu I have a user account "administrator" which is in the admin group. It has a complicated password for security. OpenSSH by default allows all users to attempt to login remotely. Since user accounts often have weak passwords it's unsafe to allow this.
Read more »Category: High End Tags:
- Login to post comments
SSH login without password
For this you required to generate your own personal set of private/public pair. ssh-keygen is used to generate that key pair for you.
On the user’s home directory, on the localhost, type
Read more »Category: Beginner Tags:
- Login to post comments
Secure remote firewall administration via SSH
Most firewall systems contain a Web-based component that allows you to configure the firewall. This holds true for most entry-level firewall systems (Linksys, D-Link, etc.) and also open source firewall systems such as pfSense. These systems tend to provide ways to access the Web interface remotely via the Internet; however, this should not be considered secure at all.
Read more »Category: High End Tags:
- Login to post comments
Access Remote Filesystems from ubuntu desktop
Ubuntu 9.04 desktop support accessing remote file system from the places menu. Click on Places->Connect to server . You will get the following pop up.
Read more »Category: Beginner Tags:
- Login to post comments
See who’s poking your Linux box
If you’re using SSH and you have your ports wide open to the world, your best bet would be to install fail2ban.
Read more »Category: High End Tags:
Prevent brute force attacks on SSH servers with DenyHosts
DenyHosts is a Python script that analyzes the sshd server log messages to determine what hosts are attempting to hack into your system. It also determines what user accounts are being targeted. It keeps track of the frequency of attempts from each host.DenyHosts is designed for the use by Linux system administrators, the script can be useful to anybody running an sshd server.
Read more »Category: End User Tags:
Creating Secure Tunnels With ssh
If you manage remote servers or if you have more than one computer you most likely have used the ssh command. A simple description of ssh is that it's a secure version of telnet, but that's like saying a Porsche is a just a better version of a Volkswagen bug.
Read more »Category: High End Tags:
- Login to post comments
My Vietnamese 8th Graders are new Linux users
With just less than one month left of class, I decided to see if my 8th Grade students at the American International School in Saigon would be interested in learning Linux. I am glad I tried because these kids seemed to be having a lot of fun.
Read more »Category: Community Tags:
- Login to post comments
Set up a SSH-based point to point connection
OpenSSH version 4.3 introduced a new feature: the ability to create on-the-fly "Virtual Private Networks" via the tunnel driver (the so-called "tun" driver). This allows you to create a network interface that bridges two physically disparate network segments in different locations.
Read more »Category: High End Tags:
- Login to post comments
Getting UTF-8 working in Emacs inside a terminal SSH session
"I can’t believe this can be so difficult! I’ve for a long time used Emacs and VM for one of a couple of email accounts. It’s great, fast and wonderful. However, Emacs VM doesn’t deal with IMAP that well and I decided last month to ditch it for Mutt [...] So now, I get full UTF-8 support as well as Emacs shortcuts when running Mutt/Emacs inside an SSH session! "
Read more »Category: High End Tags:
- Login to post comments
Debian Installation Over SSH (Lenny RC1)
"The Debian Installer lenny release candidate 1 was released on November 12th, which inspired me to check it out and give the installation over ssh a try..."
Read more »Category: Beginner Tags:
- Login to post comments
Parallel SSH execution and a single shell to control them all
Many people use SSH to log in to remote machines, copy files around, and perform general system administration. If you want to increase your productivity with SSH, you can try a tool that lets you run commands on more than one remote machine at the same time.
Read more »Category: High End Tags:
- Login to post comments
Towards using the FreeRunner as my primary phone
"Having had some time to play around with the FreeRunner's software (see my previous post), I can make a few more remarks about it now.
Read more »Don't use sshkeygen.com to generate keys!
To my horror, I recently saw this online SSH key generator. I hope nobody reading this needs to be told why this is a bad idea. However, in case you do, here are a few reasons
Read more »Category: End User Tags:
- Login to post comments