You are here |
nbailey.ca | ||
| | | |
dustymabe.com
|
|
| | | | It is common practice among Linux users to exchange ssh keys between machines so that you can ssh between them without having to authenticate. The manual process for doing this involves taking the public key of the local host (~/.ssh/id_rsa.pub or ~/.ssh/id_dsa.pub) and appending it to the ~/.ssh/authorized_keys file of the remote host you wish to log in without a password. This process is simple, but requires a few different steps. | |
| | | |
nsirap.com
|
|
| | | | installation of docker and docker-compose with Ansible Playbook. This will automate the installation of docker and docker-compose on a remote server. | |
| | | |
www.jamieweb.net
|
|
| | | | Using the Ansible configuration management tool to automatically deploy a Tor Onion v3 Hidden Service to a Linux machine. | |
| | | |
materials.rangeforce.com
|
|
| | SSH (secure shell) is a widely-used protocol for remote administration of Unix and Linux servers. The default configuration of many SSH server implementations includes several potentially-insecure settings so as to maintain compatibility with outdated client software. The ssh-audit tool can be used to check the server settings and recommend changes so as to improve security. |