hkdbhkdb.hashnode.dev·May 20, 2024Wireguard vs OpenVPNTHIS POST WAS ORIGINALLY POSTED ON FEBRUARY 13TH, 2020 ON MEDIUM Most of you that I have daily conversations with know, I have lately been paying even closer attention to remote access solutions as I am working on a project in this particular space o...Discussvpn
Ron Bhubandspoke.amastelek.com·May 10, 2024📞Elevating Remote Access with Fusion's Last Mile SD-WAN: Navigating the Remote Connectivity Landscape in South Africa 🇿🇦The landscape of modern work environments has seen a notable shift, with remote work becoming increasingly prevalent. In today's interconnected world, the demands for securely connecting employees in their home offices or co-location office space mir...DiscussSDWAN
Boatbuilderboatbuilder.hashnode.dev·Apr 12, 2024Get Instant Secure Terminal Access to Any Machine Without Keys Or PasswordsIn the world of high-performance computing, efficiently accessing remote machines and a terminal is crucial for developers. The traditional approach here is to setup SSH and all the cloud VMs comes with SSH built in. However, it comes with challenges...Discussremote ssh
Gokulcarbide.hashnode.dev·Feb 13, 2024Use SSH certificate authentication insteadWhy you need certificate based authentication in SSH? We all know that the most beginner friendly method to ssh is to use password based authentication. But it is susceptible to a wide range of attacks including Brute Force Attacks, Password reuse, P...Discuss·60 likes·82 readsssh
Hongtech.mrleong.net·Dec 21, 2023Always-on Reverse SSH TunnelWhat Is SSH Tunnel There are many articles providing better and detailed explanation. I will provide a brief explanation here. Readers are expected to know what SSH Tunnel in order to benefit from this blog post. SSH Tunnel works by establishing a SS...DiscussHow-tossh
Lois Basseythatladydev.hashnode.dev·Nov 28, 2023Secure Ubuntu Server: Step-by-Step Guide to Creating a New User on Digital OceanIt is not just recommended but crucial to create a new user separate from the default “root” user on provisioning a new Digital Ocean droplet. Why? For security reasons. Relying solely on the ‘root’ user for remote access is similar to leaving your ...Discuss·32 readsDigitalOcean
Nee4pfsec.com·Aug 28, 2023Twingate: The Future of Remote AccessIntroduction Twingate is a cloud-based service that provides secured remote access to an organization’s networks. It’s function is very similar to a business VPN. Twingate makes Zero Trust Network Access (Yes, Buzzword. I know) easy to deploy, even e...Discuss·302 readszerotrust
Bakunga Bronsonblog.bakungabronson.com·Jun 13, 2023Accessing SSH When Port 22 is Blocked: Solutions and RecommendationsIntroduction: Secure Shell (SSH) is a vital tool for developers and accessing platforms like GitHub. However, some networks, such as those provided by Simba Net in Uganda, often block traffic to port 22, making SSH inaccessible. This article aims to ...Discuss·63 readsssh
Lucas Tanigutitaniguti.blog·May 14, 2023Setting Up Chrome and Firefox to Navigate the Web via SSH TunnelsIf you're engaged in any form of intensive data processing or software development, chances are you've encountered SSH (Secure Shell). This powerful tool is ubiquitous in the IT industry for its versatility, security, and ease of use. This article wi...Discuss·709 readsssh
Shubham Pawarblog.mobinex.io·Dec 15, 2022Introducing AdbOrcI used to work as a Software Engineer at Qualcomm, where they maintained a fleet of mobile devices for development and testing. Typically, developers had these devices connected to their setups and sharing them with other members of the team was not ...Discuss·38 readsAndroid