The ssh files (2)

Welcome to the second instalment of the ssh files. In this instalment, we’ll be taking a look at logging in without a password, using public key authentication. The major benefit of logging in through public key authentication, is that you will only have to remember the pass phrase of your key and no longer a dozen or more passwords on different servers. Also, setting your ssh daemon to only allow public key authentication will foil any attempts by script kiddies to brute force your password…because there isn’t one. Continue reading The ssh files (2)

The ssh files (1)

If you have ever had to administer Linux (or Unix) servers, you are probably familiar with ssh, the secure shell client. For those of you not familiar with ssh, think “telnet on steroids”. For those of you not familiar with telnet or ssh…what are you doing administering servers? Ssh is like the Swiss army knife of remote connectivity. It can do so much that I think that no one has ever used all of the features it offers. This article is an exploration of the basics of ssh, future articles will explore its functionality in more depth. Continue reading The ssh files (1)