Rsync and SSH tools on different Linux port to copy local as well as remote files. Backup important data to secure place with Rsync and SSH in Linux.
Source: Rsync Over Ssh On Different Port In Linux (LinOxide)
Rsync and SSH tools on different Linux port to copy local as well as remote files. Backup important data to secure place with Rsync and SSH in Linux.
Source: Rsync Over Ssh On Different Port In Linux (LinOxide)
Like most commands on Linux, SSH can be used with input/output redirection via | (Unix Pipe). SSH can be used with this pipeline too. The basic concept here is understanding how the Unix pipeline works.
When you understand the way pipes work, you can get seriously creative. This article covers what happens when you combine Unix pipes and SSH. It should be noted that since Unix pipes can be just about anything, there are no doubt going to be commands not on this list would also be useful.
NOTE: Among other things, this article shows how to do remote hard drive backup and restoration, by creating an image (.img file) of a hard drive on a remote system, assuming that you have sufficient space on the remote backup drive for the image file.
Source: How to Use SSH Pipes on Linux
A couple redditors showed interest in how I set up my Pi as a SOCKS proxy and recommended I make a separate post as a tutorial, so I’ll do my best to explain everything.
Background
SOCKS stands for Socket Secure, and is essentially just a middle man for a server and client for send information between. The best description I’ve heard of it is “It’s a poor man’s VPN.” It essentially works the same, but each service has to be configured to work with it (i.e. I have Firefox on my Mac working through my SOCKS proxy but not Chrome and Safari). Why would you want a SOCKS proxy over a VPN? From my experience, it runs better on a Pi, and I can also do multiple things over SSH (such as also run a file server). Having to configure each service to run through it can also be a pro or a con, depending on if you want everything to work through it or not.
Basic Overview
There’s really not much to setting everything up; it’s a pretty straightforward process. For those just looking for something short and sweet, here are the basic steps I followed. I’ll go over each more in depth below.
Source: RPi as a SOCKS proxy and SSH file server Tutorial (Reddit/Raspberry Pi)
In this article, we will explain five useful techniques to keep your remote SSH terminal sessions running even after session disconnection under Linux systems.
Source: 5 Ways to Keep Remote SSH Sessions and Processes Running After Disconnection (Tecmint)
Secure Shell Access (SSH) – Learn about Secure Shell Access (SSH), private and public keys, SCP, and all other topics related to the ssh command in our beginner’s tutorial.
Introduction – Introduction to SSH, how it’s better than telnet and basic ssh commands.
SSH Keys: RSA and DSA – Learn about SSH public and private keys, along with the most widely used key types – RSA and DSA. Also learn how to easily copy your public key to a host server with the ssh-copy-id command.
SSH Agent and SSH Add – Learn how to use the SSH agent daemon and the ssh-add command to manage your SSH keys and passphrases.
Secure Copying (SCP) – Learn how to use the scp command to upload and download files from remote hosts.
Source: Secure Shell Access (SSH) – Linux Command Line | Code Snipcademy
SSH is used to provide secure and encrypted communication over a network and to control servers remotely. Here’s how to secure an SSH server in Ubuntu 14.04
Source: Secure SSH Server In Ubuntu 14.04 (Make tech Easier)
FTP is a standardized network protocol and probably the quickest as well as easiest option available when a large chunk of data is to be transferred, from one host to another, over a TCP-based network. FTP defines a client-server architecture which uses two separate ‘well-known’ ports, for data (port no. 20, used for data transfer) and control (port no. 21, used for authentication) connections, in order to establish connectivity between the server and the client.
Source: How To : Set up a FTPS (FTP over SSL) Server on Linux ~ Your Own Linux..!
You are running a Linux server at home, which is behind a NAT router or restrictive firewall. Now you want to SSH to the home server while you are away from home. How would you set that up? SSH port forwarding will certainly be an option. However, port forwarding can become tricky if you are dealing with multiple nested NAT environment. Besides, it can be interfered with under various ISP-specific conditions, such as restrictive ISP firewalls which block forwarded ports, or carrier-grade NAT which shares IPv4 addresses among users.
What is Reverse SSH Tunneling?
One alternative to SSH port forwarding is reverse SSH tunneling. …..
Full article here:
How to access a Linux server behind NAT via reverse SSH tunnel (Xmodulo)
Mostly, I use SSH command to connect to my remote server. Unfortunately, today the power is gone and the Ethernet hub is turned off, so my SSH session was lost. What do you do if an important task is going on after losing your SSH session? Here is the simple tool called Tmux to keep a process running after the SSH or Putty session lost.
Full article here:
Linux Troubleshooting: How To Keep A Process Running After Putty Or SSH Session Closed? (Unixmen)
Whenever a server is accessible via the Internet, it’s a safe bet that hackers will be trying to access it. Just look at the SSH logs for any server you use, and you’ll surely find lots of “authentication failure” lines, originating from IPs that have nothing to do with you or your business. Brute-force attempts (such as “dictionary attacks”) try different passwords over and over to try to get into your box, and there’s always a chance that they eventually will succeed. Thus, it’s a good idea to apply these “three Ds” for your security: detect intruder attempts, decide when they’ve gone “over the top” (past what would be acceptable for honest-to-goodness typing mistakes), and deny them access at least for a (longish!) while.
Several tools manage this kind of monitoring (see the Resources section). In this article, I describe installing, configuring and running DenyHosts. With it, you’ll have a running background dæmon that will check your system continuously for access attempts, decide if they look unsafe, block them and inform you. DenyHosts even can be configured to share information with other servers, so whenever a hacker is detected on one system, it will be blocked on other systems too.
Full article here:
Security in Three Ds: Detect, Decide and Deny (Linux Journal)
GiottoPress by Enrique Chavez
Recent Comments