Ways to Manage Your SSH Keys and Identities

I wrote a series of blog posts a while ago about SSH authentication using cryptographic keys rather than passwords. I discussed why SSH keys provide easier authentication, how to set up an SSH key agent, and how to maintain multiple websites. There are two areas of security to consider regarding SSH. I think of them […]
Read More ›

Clean Up Your Writing With Linux Utilities

I kept noticing that I frequently make the error of doubling a word in what I write. When I write the source document in HTML or LaTeX, the line breaks are arbitrary. That means that the error may be obvious in the output, but not so obvious in the input. For example, the file I […]
Read More ›

Easily Maintain Multiple Websites with SSH

Over the past two weeks, here, and here, I told you how to set up SSH so your remote access is both more secure and more convenient. Let’s put that to use! The Scenario Let’s say that you maintain a website, and you create and edit pages on both your office desktop computer and your […]
Read More ›

How to Set Up An SSH Key Agent

Last week I showed you how to set up cryptographic authentication for SSH. We got as far as the more secure part. In an analysis of a multi-year collection of several million SSH break-in attempts I didn’t see one that tried guessing cryptographic keys. Willie Sutton supposedly said that he robbed banks because that’s where […]
Read More ›

How Can We Create Secure Passwords?

What makes a password secure? We have to keep the bad guys out while letting the legitimate user in. We need to protect authentication and prevent user identity masquerading or spoofing, so it must be impractical for the attacker to guess it. I didn’t say “impossible” because any string could be guessed eventually. But impractical, […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.