TLDR; The following command will create a new SSH key using ED25519 with an auto-generated comment.
ssh-keygen -t ed25519 -f $HOME/.ssh/id_ed25519 -C "$(whoami)@$(hostname)-$(date +'%y%m%d')" SSH Keys The best, and sometimes only, way to connect to a remote SSH server is via an SSH key. Allowing key only access to a SSH server massively reduces an attackers ability to brute force the server and raises the overall level of security.
I won't go into specific cases in this blog post. This is a general guide on how to gather the necessary information that will help you to get your problem fixed.
In this post, I'll use a Linux client
Docker has become the new standard for building your application. In a Docker image we place our source code, its dependencies, some configurations and our application is almost ready to be deployed…
Advanced Copy - Shows Progress While Copying Files in Linux
Advanced-Copy is a command line program that is very much similar, but a little modified version of the original cp and mv command with a progress bar.
With Automated Backups, ‘Cron Jobs’ May Not Work in Your Favor
Cron jobs are not sufficiently stable as a method for backup automation. In this article, we explore how best to back up data in terms of setup, frequency, data retention and general automation best practices.
Teleport is an open-source that can be used as an access plane for your global infrastructure. It provides zero-trust access to various services such ...
There a multiple use cases to run a script on login. Configuration, starting services, logging, sending a notification, and so on. I want to show you different ways to do so.
Example script
The examp
How to Backup and Restore Firefox Profile On Linux
A backup of your Firefox profile enables you to save all your browser data (extensions, history, settings, etc.) on your local machine or any other storage.
Like most folks working in infrastructure engineering in 2014, I really enjoyed Google’s BeyondCorp whitepaper. My foremost personal interest was grounded in the fact that Uber’s contemporaneous security implementation didn’t include a VPN, so it was interesting to see a well-thought description of fostering security without over-reliance on a hardened network for employee devices. I had a second, longer-term, personal interest as well, which was never again having to argue with a coworker about why they needed to log into the VPN before accessing a secure resource.
To make it quick, I wish I had known about port forwarding and tunneling earlier. With this blog post, I try to understand it better myself and share some experiences and tips with you.
Topics: use ca