Uttam Mahatauttammahata.hashnode.dev·Nov 13, 2024How to Access Linux Laptop Files on Your Mobile via SFTPSecurely accessing your Linux laptop’s files from your mobile device can be efficiently done using SFTP (Secure File Transfer Protocol). Follow these steps to set up SFTP and connect your mobile device to your Linux laptop. 1. Set Up SFTP on Your Lin...ftp
hkdbhkdb.hashnode.dev·May 20, 2024Wireguard vs OpenVPNTHIS POST WAS ORIGINALLY POSTED ON FEBRUARY 13TH, 2020 ON MEDIUM Most of you that I have daily conversations with know, I have lately been paying even closer attention to remote access solutions as I am working on a project in this particular space o...vpn
Ronald Bartelshubandspoke.amastelek.com·May 10, 2024📞Elevating Remote Access with Fusion's Last Mile SD-WAN | Navigating the Remote Connectivity Landscape in South Africa 🇿🇦The landscape of modern work environments has seen a notable shift, with remote work becoming increasingly prevalent. In today's interconnected world, the demands for securely connecting employees in their home offices or co-location office space mir...1 likeSDWAN
Boatbuilderboatbuilder.hashnode.dev·Apr 12, 2024Get Instant Secure Terminal Access to Any Machine Without Keys Or PasswordsIn the world of high-performance computing, efficiently accessing remote machines and a terminal is crucial for developers. The traditional approach here is to setup SSH and all the cloud VMs comes with SSH built in. However, it comes with challenges...remote ssh
Gokulblogs.itsgokul.co·Feb 13, 2024Use SSH certificate authentication insteadWhy you need certificate based authentication in SSH? We all know that the most beginner friendly method to ssh is to use password based authentication. But it is susceptible to a wide range of attacks including Brute Force Attacks, Password reuse, P...60 likes·120 readsssh
Hongtech.mrleong.net·Dec 21, 2023Always-on Reverse SSH TunnelWhat Is SSH Tunnel There are many articles providing better and detailed explanation. I will provide a brief explanation here. Readers are expected to know what SSH Tunnel in order to benefit from this blog post. SSH Tunnel works by establishing a SS...40 readsHow-tossh
Lois Basseythatladydev.hashnode.dev·Nov 28, 2023Secure Ubuntu Server: Step-by-Step Guide to Creating a New User on Digital OceanIt is not just recommended but crucial to create a new user separate from the default “root” user on provisioning a new Digital Ocean droplet. Why? For security reasons. Relying solely on the ‘root’ user for remote access is similar to leaving your ...58 readsDigitalOcean
Nee4pfsec.com·Aug 28, 2023Twingate: The Future of Remote AccessIntroduction Twingate is a cloud-based service that provides secured remote access to an organization’s networks. It’s function is very similar to a business VPN. Twingate makes Zero Trust Network Access (Yes, Buzzword. I know) easy to deploy, even e...360 readszerotrust
Bakunga Bronsonblog.bakungabronson.com·Jun 13, 2023Accessing SSH When Port 22 is Blocked: Solutions and RecommendationsIntroduction: Secure Shell (SSH) is a vital tool for developers and accessing platforms like GitHub. However, some networks, such as those provided by Simba Net in Uganda, often block traffic to port 22, making SSH inaccessible. This article aims to ...72 readsssh
Lucas Tanigutitaniguti.blog·May 14, 2023Setting Up Chrome and Firefox to Navigate the Web via SSH TunnelsIf you're engaged in any form of intensive data processing or software development, chances are you've encountered SSH (Secure Shell). This powerful tool is ubiquitous in the IT industry for its versatility, security, and ease of use. This article wi...2.5K readsssh