May 24, 2017 9:09 am


How Low Can You Go?

Every since my days on dial-up internet and telnet MUD's, I've always been interested in low-bandwidth utilities. After all, not every user get's to live in an area that provides unlimited high-speed broadband. Some, like those who depend on cellular or satellite internet, have to choose between work and watching a few YouTube videos. This […]

Read More

By: Erico Mendonca

July 24, 2015 9:22 am


Running graphical programs remotely as root

Sometimes when dealing with Linux servers, you find products that require running a graphical installer as root. That's fine when you have access to the graphical console, and you can do it using various methods, like gnomesu or kdesu. But what happens when you need to run it via SSH? (more…)[…]

Read More

By: olorin112

March 19, 2010 4:26 pm


XEN live migration over encrypted connection (ssh tunnel)

As XEN only has limited authorization capability for its live migration and all the communication is unencrypted, this solution shows how to set up live migration over an ssh tunnel. If live migration is enabled, the xend listens at port 8002 on any interface for incoming migration requests, as configured in /etc/xen/xend-config.sxp: # Port […]

Read More

By: woodsy_ca

July 28, 2009 2:28 pm


Configuring syslog-ng

I've recently configured a new file transfer server based on SLES 10. This replaces an aging NetWare 6.5 server. I have it configured for file transfers via FTP (using vsftpd) and SFTP. FTP uses tcp-wrappers to limit external access via IP address. Both FTP and SFTP users are chroot'd to their home directories. To […]

Read More

By: dgersic

May 29, 2009 1:02 pm


Further Securing OpenSuSE 11.1 Against SSH Script Attacks

Contents: Introduction 0. The Obvious 1. Securing OpenSSH 2. Initial Firewall Configuration 3. SSHBlacklist 4. Integrating SSHBlack in to SuSEFirewall2 5. Checkpoint and Restart Conclusion Introduction As initially installed, an OpenSuSE 11.1 machine is reasonably secure. The SuSE firewall is installed and activated, which blocks SSH access to the machine. This is secure, but […]

Read More

By: DamianMyerscough

June 26, 2008 4:06 pm


Syslog-ng – SSH Logging

"The syslog-ng application is a flexible and highly scalable system logging application that is ideal for creating centralized logging solutions. The main features of syslog-ng are; reliable log transfer, secure logging using SSL/TLS, IPv4 and IPv6 support and many others" (Syslog-ng, 2008). Problem In SUSE Linux Enterprise server you may have noticed that the […]

Read More

By: dhardik

April 11, 2008 3:02 am


SSH Quick Login and Get Result Approach: No More Long Syntax!

Many of you know how to do password-less login with SSH. Below is my approach. person@NOVELLDESK:~> ssh-keygen -t dsa Generating public/private dsa key pair. Enter file in which to save the key (/home/person/.ssh/id_dsa): Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /home/person/.ssh/id_dsa. Your public […]

Read More

By: DamianMyerscough

February 11, 2008 7:16 am


SSH (Secure Shell) Tricks III

SSH Tricks Part III This article is part three of SSH tricks, the first and second articles are available at [1] and [2]. In this article we will take a look at; building the latest version of OpenSSH (4.7), restricting users and groups access to the SSH daemon, disconnecting idle users and finally we […]

Read More

By: DamianMyerscough

February 5, 2008 8:23 pm


SSH (Secure Shell) Tricks II

SSH Tricks Part II This article is part two of SSH tricks, the first article is available at [1]. In this article we will take a look at; public key authentication, building a list of known hosts using the "ssh-keyscan" utility to help defend against man in the middle attacks and installing the DenyHosts […]

Read More

By: DamianMyerscough

January 18, 2008 3:50 pm


SSH (Secure Shell) Tricks

SSH (Secure Shell) Tricks In this article we will cover some basic and advanced tricks with the SSH daemon along with some tips on tighten the security. The tricks that will be cover in this article are "port forwarding", "reverse port forwarding", "executing remote commands without the need of logging in" and […]

Read More