Benjamin is a business consultant, coach, designer, musician, artist, and writer, living in the remote mountains of Vermont. He has 20+ years experience in tech, an educational background in the arts, ...
While the Raspberry Pi can work as a basic desktop alternative, you're probably using it for more advanced projects — most of ...
How to configure SSH to use a non-standard port with SELinux set to enforcing Your email has been sent Switching the SSH listening port is an easy way to help secure remote login on your Linux servers ...
Community driven content discussing all aspects of software development from DevOps to design patterns. One of the most secure ways to communicate across the public internet is to use SSH. This is why ...
In the never-ending search to work smarter, not harder, few things can be simpler than entering commands on one Mac and having them pushed out across the entire LAN to multiple nodes. One of these ...
Secure Shell (SSH) keys are used on modern networks for computers to identify each other, and to grant secure access from one computer on a network to another. The basic was SSH runs is with keys, you ...
[Drew DeVault] recently wrote up some interesting instructions on how to package up interactive text-based Linux commands for users to access via ssh. At first, this seems simple, but there are quite ...
I have two Cisco Catalyst 2960-S 48-port switches "stacked" using the Cisco FlexStack module. Originally I had to set them up using "Express Setup", which I absolutly hate from my limited use of it. I ...
Over at the #iphone channel at irc.osx86.hu, the thoroughly awesome NerveGas has figured out how to enable ssh on the iPhone without using restore mode. The secret lies in overwriting an existing ...
If you spend a lot of time at the command line you may have run into an annoying issue where your session times out after a relatively brief period of inactivity. While this is desirable from a ...