Category: Linux

0

What Is Default SFTP Port and How To Change SFTP Port Number?

SFTP is secure version of the FTP . SFTP provides encrypted channel with the remote server. This makes authentication and data transfer more secure than FTP. SFTP protocol is generally provided by SSH servers by default. In this tutorial we will learn the default SFTP port and how to change...

0

How To Find And Change SSH Port Number?

ssh  is default protocol used to manage remote systems which are mainly Linux and Network Devices. As it is working over network connection and uses TCP it has a default port number which is 22  . In this tutorial we will look how to change the default port number from...

0

Debug Applications with gdb In Linux

gdb is the short form of GNU Debugger. Debugger is a tool used to search and find and get detailed information about bugs in applications binaries. gdb is popular in Linux community which is used by most of the IDE, Programming tools event in Android IDE’s. In this tutorial we will look...

0

What Is Nagios?

Nagios is an open source system, network, application monitoring system. Nagios is designed to be run on Linux operating system or distributions like Ubuntu, Debian, CentOS etc. Architecture and Components Nagios is not a single component to run. Nagios is actually a suite which provides following components. Nagios IX Nagios...

0

What Is OpenSSL Library?

OpenSSL is most popular open source cryptography library which provides a lot of tools, libraries, algorithms about cryptography. It is mostly known with Secure Socket Layers (SSL) and Transport Layer Security (TLS) protocols. Supported Encryption Algorithms Encryption is used to make given data unreadable by the intruders. It is mainly...

0

What Is Linux PAM (Pluggable Authentication)

Authentication is important part of the operations systems like Linux. As Linux operating systems are multi user systems and runs a lot of services and complex scenarios they generally need robust and easy to implement complex scenarios authentication system. Linux Pluggable Authentication a.k.a. Linux PAM is very robust and dynamic...

0

How To Solve ssh-copy-id “ERROR: failed to open ID file” Error

ssh provides secure access to the remote systems console or command line. All linux boxes uses ssh securely. There are a lot of steps to make things secure and easy while connecting and using ssh. ssh provides passwordless authentication with certificates. We can use ssh-copy-id to send our certificate to the remote system but...

0

How to Add Ssh Keys with ssh-add In Linux?

SSH protocol provides different ways for authentication. Key based authentication is the most secure one. In order to use key based authentication we should store the key in a command place. SSH agents reads keys and uses for authentication with remote system. We can use ssh-add to store keys in a...

Enjoy this blog? Please spread the word :)