background preloader

Getting started with SSH - Kimmo Suominen

Getting started with SSH - Kimmo Suominen
The following sections hope to provide enough information to setup a user new to ssh with the appropriate files necessary for accessing remote hosts in a secure manner. Improvements to and comments about this document are welcome. Updated: The examples now show ssh version 2 commands, using OpenSSH. There are several security vulnerabilities in protocol version 1. Contents About public key cryptography Public key cryptography uses a public key to encrypt data and a private key to decrypt it. What this means is that it is safe to send your public key (i.e. the contents of the ~/.ssh/id_rsa.pub file) in electronic mail or by other means e.g. to have a system administrator of a remote site install that key into your ~/.ssh/authorized_keys file. To further protect your private key you should enter a passphrase to encrypt the key when it is stored in the filesystem. Creating your authentication key The very first step is to use ssh-keygen to create an authentication key for yourself. #! ?

dmidecode: What's it good for? By Joe Barr on November 29, 2004 (8:00:00 AM) You know you're living in a cutthroat world when your BIOS lies to your operating system at boot time. Yet that's exactly what often happens, to one degree or another, depending on the manufacturer and model of the system. Some of the BIOS lies cause problems for Linux and some don't. The dmidecode project provides the means to learn exactly what claims your BIOS is making about your hardware. Strange as it might seem, it's useful information, even when it's not 100% reliable. According to the project home page, dmidecode's purpose is to report "information about your system's hardware as described in your system BIOS according to the SMBIOS/DMI standard... Alan Cox has since moved on to other things, and dmidecode has been rewritten and is now maintained by Jean Delvare. In a perfect world, all manufacturers would write accurate and complete DMI table entries in the BIOS. More on page 2...

How to clone virtual machines in VMware ESXi Updated: April 8, 2009 This tutorial may not be applicable to many home users, but if you happen to be using VMware ESXi in your environment for whatever reason, then you will like this article. VMware ESXi is a bare-metal hypervisor, offered for free, a sort of a teaser meant to convince you into buying the more fully featured ESX Server product, which has it all, including the infinitely higher price. The ESXi is a sort of a poor man's solution for bare-metal virtualization. For more about virtualization in general, please read my other tutorials. Before we begin, since this tutorial touches business aspects of virtualization, I must make a corporate leap and emphasize that you should check for any potential issues with terms of use and licensing with the vendors of the products that you may want to use. Cloning virtual machines on VMware ESXi The demonstration is done using VMware Infrastructure Client on Windows, so Linux users please forgive me ... but the idea remains the same.

Linux Professional Institute (LPI) exam prep : Overview Before you take the Linux Professional Institute (LPI) exams, review these developerWorks articles and tutorials, designed as self-study guides for each topic in the exams. Start here to build your Linux skills Introduce yourself to Linux and advance your proficiency through a spectrum of self-paced articles and tutorials. Use them to build fundamental skills on Linux system administration at your level of expertise: Foundational concepts (the 101- and 102-series articles, which correspond to LPIC-1 certification) Intermediate to advanced topics (the 201- and 202-series tutorials, which correspond to LPIC-2 certification)Expert topics (the 301-series tutorials, which correspond to LPIC-3 certification) See all LPI-oriented articles and tutorials on developerWorks. And prepare for LPI certification The Linux Professional Institute (LPI) certifies Linux® system administrators at three levels: To attain certification level 1, you must pass LPIC-1 exams 101 and 102. Our readers say...

TECH SOURCE FROM BOHOL: 7 Best Free/Open-source Backup Software for Linux Backup Software for Linux: A computer application utilized to perform a complete backup by duplicating the original source of data is called backup software. Obviously, the main purpose of backup software is to create order out of chaos by recovering essential files in the event of a disaster. Some of the popular backup programs are sql, remote, and offsite backup software. If you are using Linux, there are plenty of backup software to choose from. I have here a list of some of the best free and open source backup software that you may want to check out. Time VaultTime Vault is a GNOME-based Linux-equivalent to Time Machine from Apple. Clonezilla Clonezilla is an open source clone of Symantec Ghost Corporate Edition. Duplicity Duplicity backs directories by producing encrypted tar-format volumes and uploading them to a remote or local file server. Bacula Bacula is an open source, enterprise level computer backup system for heterogeneous networks. rsync FlyBack

Related: