ssh

warning: Creating default object from empty value in /home/www/drupal/drupal-6.19/modules/taxonomy/taxonomy.pages.inc on line 34.
15

Distributing New SSH Keys Using Rsh On Linux And Unix

http://linuxshellaccount.blogspot.com

Quick and easy shell script to help setup openssl, openssh and zlib, while creating new ssh host keys, network-wide using rsh.

Read more »
eggixyz's picture
Created by eggixyz 6 years 28 weeks ago – Made popular 6 years 28 weeks ago
Category: Beginner   Tags:
21

The Ultimate SSH Security Tutorial

http://tuxtraining.com

SSH is one of the most secure communication methods we have. It’s encrypted, and even the passwords can’t be sniffed. But it’s not invincible. Weak passwords can be brute forced and open ports invite automated bots looking for that open port 22. But there’s a number of ways we can harden our ssh server.

Read more »
devnull's picture
Created by devnull 6 years 32 weeks ago – Made popular 6 years 32 weeks ago
Category: End User   Tags:
16

Run any GNU/Linux app on Windows without any virtualization

http://www.freesoftwaremagazine.com

SSH tools, long used by UNIX gurus to perform complicated administrative tasks over the internet on machines miles away, are a very simple and user-friendly solution for more conventional purposes. Ubuntu users, read on to learn how to use SSH to run your favorite GNU/Linux software on Microsoft Windows—without installing any software on the Windows box.

Read more »
dave's picture
Created by dave 7 years 6 weeks ago – Made popular 7 years 6 weeks ago
Category: End User   Tags:
13

SSH Port Forwarding

http://www.redhatmagazine.com

SSH (Secure SHell) is well known to Linux administrators as the de facto method for connecting to other systems. SSH long ago supplanted other connection methods because it strongly encrypts the connection between the hosts, ensuring that passwords and any transmitted data are safe from prying eyes.

Read more »
greengrass's picture
Created by greengrass 7 years 7 weeks ago – Made popular 7 years 7 weeks ago
Category: End User   Tags:
16

Simple home networking with SSH

http://www.linux.com

The Secure Shell (SSH) network protocol makes it easy to connect computers that are running Linux, share files, and remotely run applications. Along with an X server, it can make sharing a single computer simple on a home network.

Read more »
snotbutter's picture
Created by snotbutter 7 years 9 weeks ago – Made popular 7 years 9 weeks ago
Category: High End   Tags:
18

SSH with Putty...

http://polishlinux.org

One of my favourite tools (that I use almost everyday) is PuTTY. I use it both on Windows (very useful because Windows has no SSH client) and on Linux. It is a program that enables SSH connections using a graphical interface. It also allows for the establishment of SSH tunnels as well as omitting some of the restrictions to Internet access.

Read more »
C733tus's picture
Created by C733tus 7 years 10 weeks ago – Made popular 7 years 9 weeks ago
Category: Beginner   Tags:
24

Security Tip: Disable Root SSH Login on Linux

http://www.howtogeek.com

One of the biggest security holes you could open on your server is to allow directly logging in as root through ssh, because any cracker can attempt to brute force your root password and potentially get access to your system if they can figure out your password.

Read more »
C733tus's picture
Created by C733tus 7 years 11 weeks ago – Made popular 7 years 11 weeks ago
Category: High End   Tags:
21

SSH beyond the command line

http://www.freesoftwaremagazine.com

If you’re an experienced administrator, you’ve probably used SSH to remotely access a troublesome box or your personal computer. For those who don’t know: SSH it’s a great way to fiddle with a computer from miles away as if you were sitting at its keyboard, but it’s also just about the simplest and most secure way to configure your computer to let you access its files from anywhere.

Read more »
tony's picture
Created by tony 7 years 13 weeks ago – Made popular 7 years 13 weeks ago
Category: High End   Tags:
11

Open Source Security, Part 2: 10 Great Apps

http://www.linuxinsider.com

Having many more eyes watching the code and a community of developers backing up users, open source security applications provide a wide range of options and made-to-order uses. Here's a list of 10 serious open source security applications, gathered via the word-of-mouth of the CSOs who use them.

Read more »
snotbutter's picture
Created by snotbutter 7 years 18 weeks ago – Made popular 7 years 18 weeks ago
Category: End User   Tags:
12

VNC over SSH : securing the remote desktop

http://ubuntu-tutorials.com

I was discussing VNC this afternoon with some students and the question came up on how to secure VNC. As you may have noticed most network protocols do not have much for built in security. Many rely on other programs for their network security needs, such as ssh. This is also the case with VNC.

Read more »
snotbutter's picture
Created by snotbutter 7 years 28 weeks ago – Made popular 7 years 28 weeks ago
Category: High End   Tags: