Quick and easy shell script to help setup openssl, openssh and zlib, while creating new ssh host keys, network-wide using rsh.
Read more »The Ultimate SSH Security Tutorial
SSH is one of the most secure communication methods we have. It’s encrypted, and even the passwords can’t be sniffed. But it’s not invincible. Weak passwords can be brute forced and open ports invite automated bots looking for that open port 22. But there’s a number of ways we can harden our ssh server.
Read more »Category: End User Tags:
- Login to post comments
Run any GNU/Linux app on Windows without any virtualization
SSH tools, long used by UNIX gurus to perform complicated administrative tasks over the internet on machines miles away, are a very simple and user-friendly solution for more conventional purposes. Ubuntu users, read on to learn how to use SSH to run your favorite GNU/Linux software on Microsoft Windows—without installing any software on the Windows box.
Read more »- Login to post comments
SSH Port Forwarding
SSH (Secure SHell) is well known to Linux administrators as the de facto method for connecting to other systems. SSH long ago supplanted other connection methods because it strongly encrypts the connection between the hosts, ensuring that passwords and any transmitted data are safe from prying eyes.
Read more »Category: End User Tags:
Simple home networking with SSH
The Secure Shell (SSH) network protocol makes it easy to connect computers that are running Linux, share files, and remotely run applications. Along with an X server, it can make sharing a single computer simple on a home network.
Read more »Category: High End Tags:
- Login to post comments
SSH with Putty...
One of my favourite tools (that I use almost everyday) is PuTTY. I use it both on Windows (very useful because Windows has no SSH client) and on Linux. It is a program that enables SSH connections using a graphical interface. It also allows for the establishment of SSH tunnels as well as omitting some of the restrictions to Internet access.
Read more »Category: Beginner Tags:
- Login to post comments
Security Tip: Disable Root SSH Login on Linux
One of the biggest security holes you could open on your server is to allow directly logging in as root through ssh, because any cracker can attempt to brute force your root password and potentially get access to your system if they can figure out your password.
Read more »Category: High End Tags:
- Login to post comments
SSH beyond the command line
If you’re an experienced administrator, you’ve probably used SSH to remotely access a troublesome box or your personal computer. For those who don’t know: SSH it’s a great way to fiddle with a computer from miles away as if you were sitting at its keyboard, but it’s also just about the simplest and most secure way to configure your computer to let you access its files from anywhere.
Read more »Open Source Security, Part 2: 10 Great Apps
Having many more eyes watching the code and a community of developers backing up users, open source security applications provide a wide range of options and made-to-order uses. Here's a list of 10 serious open source security applications, gathered via the word-of-mouth of the CSOs who use them.
Read more »Category: End User Tags:
- Login to post comments
VNC over SSH : securing the remote desktop
I was discussing VNC this afternoon with some students and the question came up on how to secure VNC. As you may have noticed most network protocols do not have much for built in security. Many rely on other programs for their network security needs, such as ssh. This is also the case with VNC.
Read more »Category: High End Tags:
- Login to post comments
- « first
- ‹ previous
- 1
- 2
- 3