public key – POFTUT

What Is HTTPS?

What Is HTTPS?

Hypertext Transfer Protocol Secure or HTTPS is an extension and secure alternative to the HTTP protocol. HTTPS is very same with the HTTP where the traffic is encrypted using TLS or Transport Layer Security. All major browsers like Google Chrome, Mozilla Firefox, Apple Safari, Opera, Microsoft Edge supports the HTTPS protocol. HTTPS also referred as … Read more

Error: Permission denied (publickey) and Solution

ssh or similar applications use Public and Private Key mechanism in order to authenticate and authorize given users. We have all ready examined Key based authentication and authorization in previous tutorials. Permission denied(public key) error is generally occurs for can not reading Public and Private key properly to authenticate to remove server. In this tutorial we … Read more

How To Solve ssh-copy-id “ERROR: failed to open ID file” Error

ssh provides secure access to the remote systems console or command line. All linux boxes uses ssh securely. There are a lot of steps to make things secure and easy while connecting and using ssh. ssh provides passwordless authentication with certificates. We can use ssh-copy-id to send our certificate to the remote system but what can we do if … Read more

How To Install and Use GPG Encryption In Linux In Order To Encrypt and Decrypt Files and Folder?

How To Install and Use GPG Encryption In Linux In Order To Encrypt and Decrypt Files and Folder?

Security is an important part of today’s IT operations. There are a lot of tools that provide some part of the security operations. GNU Privacy Guard or simply GPG is one of them. It provides encryption, decryption, digital signatures, and signing. Install GPG To Ubuntu, Debian, Mint and Kali For deb or apt based distributions … Read more

How to Add Ssh Keys with ssh-add In Linux?

SSH protocol provides different ways for authentication. Key based authentication is the most secure one. In order to use key based authentication we should store the key in a command place. SSH agents reads keys and uses for authentication with remote system. We can use ssh-add to store keys in a common path. Key Files Public … Read more

OpenSSL Shell Commands Tutorial with Examples

OpenSSL is free security protocols and implementation library provided by Free Software community. OpenSSL libraries are used by a lot of enterprises in their systems and products. OpenSSL libraries and algorithms can be used with openssl command. In this tutorial we will look different use cases for openssl command. Private Key Private keys should kept secret. Private … Read more

How To Generate RSA Keys with Ssh Keygen?

Ssh provides secure access to the remote system. The traffic between systems are encrypted using encryption algorithms. There are different encryption algorithms. RSA is the most popular asymmetric encryption algorithm. In this tutorial we will look how to create RSA keys with ssh-keygen RSA History RSA algorithm is created by researchers named Ron Rivest, Adi Shamir … Read more

Linux SSH Server (sshd) Configuration and Security Options With Examples

Secure Shell or with its most know name SSH is a protocol developed to connect IT systems remotely and securely. SSH works as expected client-server architecture. In this post, we will look at various security-related configuration options of the SSH daemon service or sshd. The tutorial about the client-side ssh configuration can be found in the … Read more

How To Generate Ssh Key With ssh-keygen In Linux?

How To Generate Ssh Key With ssh-keygen In Linux?

Ssh is a secure and popular protocol for managing different types of IT devices like Linux systems, network devices, etc. What makes ssh secure is the encryption of network traffic. Network traffic is encrypted with different types of encryption algorithms. There is also user authentication done with encryption algorithms. These algorithms need keys to operate. … Read more

How To Create and Setup SSH Keys For Passwordless and Public Key Based Authentication In Linux?

How To Create and Setup SSH Keys For Passwordless and Public Key Based Authentication In Linux?

Ssh is a protocol designed to make network connections between hosts secure. Ssh is a defacto standard for Linux and related operating systems. Ssh encrypts the connection between sides. Ssh gives terminal access between host and server. To get a terminal there need to be an authentication process. The authentication process is generally password-based but … Read more