Explore >> Select a destination


You are here

www.jhanley.com
| | www.jamieweb.net
9.9 parsecs away

Travel
| | Using Git to centrally manage, verify, update and distribute your SSH known_hosts.
| | colincogle.name
9.5 parsecs away

Travel
| | SSH is easy to secure, but that doesn't mean there isn't more work to be done.
| | materials.rangeforce.com
7.7 parsecs away

Travel
| | SSH (secure shell) is a widely-used protocol for remote administration of Unix and Linux servers. The default configuration of many SSH server implementations includes several potentially-insecure settings so as to maintain compatibility with outdated client software. The ssh-audit tool can be used to check the server settings and recommend changes so as to improve security.
| | dustymabe.com
76.3 parsecs away

Travel
| It is common practice among Linux users to exchange ssh keys between machines so that you can ssh between them without having to authenticate. The manual process for doing this involves taking the public key of the local host (~/.ssh/id_rsa.pub or ~/.ssh/id_dsa.pub) and appending it to the ~/.ssh/authorized_keys file of the remote host you wish to log in without a password. This process is simple, but requires a few different steps.