Skip to main content

Posts

Featured

Setting up SSH key authentication

I feel like this is something I should have figured out a long time ago, however I finally got it working. I figured I would document it here if for no other reason than to have these instructions for myself SSH is a very secure method for connecting to a remote machine. It essentially establishes a text-based connection between two machines and transfers commands and responses back and forth. Anything that can be done with a command-line (read, anything on the computer) can be done via SSH. It is also the underlying protocol used by Secure Copy Protocol (SCP) and SSH File Transfer Protocol (SFTP).  SSH uses public key cryptography to encrypt sessions. For example, on my local machine I generate a cryptographic key pair. I then transfer one of those keys (called the public key though there is nothing special about it other than I chose it to be shared) and keep the other key on my machine (called the private key). This is then used to encrypt a session key that will be used to encrypt

Latest Posts

Crontab problems with run-part

Bash shell colors

Returning An Empty Value In LibreOffice Calc

Omega Seamaster 300M James Bond Edition with British Government Markings

Google Photos Abandons "Free Forever" High Quality Backups

Mary Poppins Watch

Copying and Pasting Formatted Text From Modern Applications Into Adobe Indesign CS3

Cleaning up folder copies with WinMerge

Google Music Sound Quality Issue (Resolved)

Mac 'Home' and 'End' keys to behave like Windows