New Toys

Well I’ve got these toys for some time, but I was pretty busy these days. So here are them all:
- Blackberry 8300. After 7 years, my Simense 3568i stops working. I was planning to get some simple mobile with bluetooth and EDGE, to get the N810 online when there’s no WIFI available, because right now […]

an introduction to openssh part 5 — config files

Well the ultimate way to tweak a program (besides modify the source)
is to edit the configure file. This is what we are gonna talk about in
this part.
There are two kind of config file for OpenSSH: for the server side and
for the client side.
- For the server side
The server side configure file is usually /etc/ssh/sshd_config. No
matter […]

an introduction to openssh part 4 — SSH on Windows

It is ideal if we can live in a Unix only world. However sometimes we’ll need MS windows. In this part we’ll talk about using OpenSSH, or SSH in general, on MS Windows platform. On the OpenSSH Alternatives for Windows page, there is a list of available free/open source software. We’ll talk about the two […]

An introduction to OpenSSH part 3 — Port forwarding

(originally posted at www.linuxboxadmin.com )
Last time when we talked about transfering files over OpenSSH, I said you can use port forwarding if you insist to use your favorite FTP client, and we have a brief HOW-TO there. This time, we’ll take a deeper look at port forwarding.

How port forwarding works.Normally network protocols works on two […]

An introduction to OpenSSH part 2 — copy files

(originally posted at www.linuxboxadmin.com )
This time we’ll talk about transferring files using OpenSSH. The most
common ways to transfer files between Unix hosts are: rcp, ftp, and
rsync.

rcp and its SSH version: scpThe command rcp works like cp, but it can copy files to and from
remote files. For example, if you want to copy a “test” file […]

An introduction to OpenSSH

(originally posted at www.linuxboxadmin.com )
Well, someone want me to write something about OpenSSH, so here it is.

Why SSH?A lot of Internet protocols are based on telnet, FTP, POP3, SMTP,
etc. That is, these protocols works like two man talking:
“Hello, this is John.”
“Hi, John, please provide your password.”
“My password is ’secret’.”
“OK, you have the right password, please […]

Close
E-mail It