background preloader

25 Best SSH Commands / Tricks - StumbleUpon

25 Best SSH Commands / Tricks - StumbleUpon
OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. The encryption that OpenSSH provides has been strong enough to earn the trust of Trend Micro and other providers of cloud computing.Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions. SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres the top Voted SSH commands 1) Copy ssh keys to user@host to enable password-less ssh logins. ssh-copy-id user@host To generate the keys use the command ssh-keygen 2) Start a tunnel from some machine’s port 80 to your local post 2001 ssh -N -L2001:localhost:80 somemachine Have Fun

70 Things Every Computer Geek Should Know. | Arrow Webzine - StumbleUpon The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. How to become a real computer Geek? Little known to most, there are many benefits to being a computer geek. You may get the answer here: The Meaning of Technical Acronyms 1. 2. If you rolled your eyes here, that is a good thing. 3. 4. 5. 6. 7.

DC++ your files, your way, no limits Kernel links Juan-Mariano de Goyeneche < jmseyas@dit.upm.es > /* * The latest version of this document may be found at: * */ The need for a document like this one became apparent in the linux-kernel mailing list as the same questions, asking for pointers to information, appeared again and again. Fortunately, as more and more people get to GNU/Linux, more and more get interested in the Kernel. But reading the sources is not always enough. It is easy to understand the code, but miss the concepts, the philosophy and design decisions behind this code. Unfortunately, not many documents are available for beginners to start. Please, if you know any paper not listed here or write a new document, send me an e-mail , and I'll include a reference to it here. The papers that follow are listed in no particular order. Enjoy! : "Iptables-tutorial" : Oskar Andreasson. : : iptables, netfilter, firewalls. : "The Linux Kernel"

Chat with Your Friends through ms dos Command Prompt - StumbleUpon -: Chat with Friends through ms dos Command Prompt :- 1) All you need is your friend's IP Address and your Command Prompt. 2) Open Notepad and write this code as it is.....! @echo off :A Cls echo MESSENGER set /p n=User: set /p m=Message: net send %n% %m% Pause Goto A 3) Now save this as "Messenger.Bat". 4) Open Command Prompt. 5) Drag this file (.bat file) over to Command Prompt and press Enter. 6) You would then see something like this: 7) Now, type the IP Address of the computer you want to contact and press enter You will see something like this: 8) Now all you need to do is type your message and press Enter. ShareThis

50 Open Source Tools to Make Your Life Easier The open source community is vibrant, continually growing, and just loves to create applications and tools to make lives easier. Here are 50 of our favorite open source apps that help us do everything from managing pictures on our computer to learning about Jupiter and Mars. Chandler – An information management application for personal use or small group collaboration. Includes integrated calendaring, data organization tools, and allows backup and data sharing via web access. Tomboy – A cross-platform note-taking application packed with features text highlighting, font styling, inline spellchecking, and more. BasKet Note Pads – More than just a note-taking app, BasKet lets you organize in track data in several different ways, import information from other apps, and easily share your notes with others. Freemind – This free mind mapping app can easily handle maps with as many as 22,000 nodes. Task Coach – A robust todo list tracker. Xchat – An IRC chat client for Linux and WIndow.

Top 20 OpenSSH Server Best Security Practices OpenSSH is the implementation of the SSH protocol. OpenSSH is recommended for remote login, making backups, remote file transfer via scp or sftp, and much more. SSH is perfect to keep confidentiality and integrity for data exchanged between two networks and systems. However, the main advantage is server authentication, through the use of public key cryptography. From time to time there are rumors about OpenSSH zero day exploit. Here are a few things you need to tweak in order to improve OpenSSH server security. Default Config Files and SSH Port /etc/ssh/sshd_config - OpenSSH server configuration file. SSH Session in Action #1: Disable OpenSSH Server Workstations and laptop can work without OpenSSH server. #2: Only Use SSH Protocol 2 SSH protocol version 1 (SSH-1) has man-in-the-middle attacks problems and security vulnerabilities. Protocol 2 #3: Limit Users' SSH Access By default all systems user can login via SSH using their password or public key. AllowUsers root vivek jerry IgnoreRhosts yes

Krebs on Security Tools and utilities for Windows Many useful ports of GNU utilities to Win32 by Karl M Syring are available at UnxUtils sourceforge site. Other useful tools and interesting source code using undocumented native API:s and an Ext2 filesystem for NT project by Adrey Shedel. Click here for update history for this page (last update 08 February 2014) All file dates are in ISO date format, YYYY-MM-DD. ImDisk Virtual Disk Driver Current version 1.7.6 built 25 October 2013 ImDisk is a virtual disk driver for Windows NT/2000/XP/Vista/7/8 or Windows Server 2003/2008/2012. An additional driver, awealloc, in this install package supports memory allocation beyond 4 GB limit on 32 bit Windows through address window extension, AWE. The ImDisk driver supports forwarding I/O requests to third-party image file format handlers or to services on other computers on the network. About the install package The install package is created using 7-zip sfx stubs and includes an .inf install script. Questions? Small command line utilities

Related: