Tags » Ssh

Manipulando chaves para o uso no SSH

Criando par de chaves para conexão com o servidor SSH

ssh-keygen -b 1024 -t rsa -N 123456

Cria uma chave com 1024 bits do tipo RSA com a palavra-chave 123456… 136 more words

Linux

building a back-end node.js app (part 1: AWS + terminal setup)

“The way to get started is to quit talking and begin doing.” -Walt Disney

A lot of friends have been asking me recently how they should go about… 1,693 more words

Cs/programming

SSH without password

SSH is one of the most friendly deamons in the Linux toolbox, you can port forward your home server, you can surf the internet via your own proxy server, you can transfer files, it’s the first thing I set up on a freshly installed box and by far the most used service around my home (yeah, that’s nerdy) :-) 307 more words

Tips

SSH: Brief Description about Secure Shell Configuration

Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. 643 more words

Theoretical About Networking

Skill Test in packet Tracer : SSH Configuration

How to configure secure shell on a Cisco router:

Sept -1: Click on Router and go to CLI (Command line interface)

Router>en

Router#config t

Enter configuration commands, one per line. 182 more words

Practical Approach

Use Amazon EC2 and ssh reverse tunneling to connect computers behind firewall or NAT

Sometime you may want to ssh to a computer(let’s name it Computer_A) that behind firewall or doesn’t have public IP address. If this computer can ssh to outside network, you could setup a ssh reverse tunnel to make Computer_A accessible from outside network. 728 more words

Amazon Ec2

SSH Cookbook: Temporarily Disable Security Message on Connection to a Remote Server

First off, DO NOT do this all the time. ONLY do this when you have evaluated the risks and decided to risk a security breach anyways. 301 more words

Configuration