Showing posts with label debian. Show all posts
Showing posts with label debian. Show all posts

SSH in simple five steps

SSH (Secure SHELL) is an open source and most trusted network protocol that is used to login into remote servers for execution of commands and programs. It is also used to transfer files from one computer to another computer over the network using secure copy (SCP) Protocol.
In this article we will show you how to setup password-less login on RHEL/CentOS 7.x/6.x/5.x and Fedorausing ssh keys to connect to remote Linux servers without entering password. Using Password-less login with SSH keys will increase the trust between two Linuxservers for easy file synchronization or transfer.
SSH Passwordless Login
Setup SSH Passwordless Login

Tails : Limitations & Warnings

Tor is about hiding your location, not about encrypting your communication.
Instead of taking a direct route from source to destination, communications using the Tor network take a random pathway through several Tor relays that cover your tracks. So no observer at any single point can tell where the data came from or where it's going.
A Tor connection usually goes through 3 relays with the last one establishing the actual connection to the final destination
The last relay on this circuit, called the exit node, is the one that establishes the actual connection to the destination server. As Tor does not, and by design cannot, encrypt the traffic between an exit node and the destination server, any exit node is in a position to capture any traffic passing through it.