Feb 18 · 3 min read · If you are a developer like me, you probably have: One personal GitHub account One work GitHub account Maybe another client account And then one day… you try to push work code , But it gets pushed from your personal account. Or worse: Permission...
Join discussion
Jan 23 · 1 min read · Step 1: Login into the AWS environment using provided credentials. Step 2: Go to EC2 section and then Launch Instance named as nautilus-ec2 ,select t2.micro type and default key and launch instance Step 3: Generate ssh key using ssh-keygen, public(...
Join discussionDec 14, 2025 · 1 min read · Welcome back to Day 22. In this lab, you will learn how to set up secure SSH access to an EC2 instance without using a password. You need to create an EC2 instance and name it nautilus-ec2. Then, generate an SSH key on the aws-client host. Af...
Join discussion
Sep 20, 2025 · 3 min read · If you’ve ever struggled with setting up SSH keys for GitHub, you know it can feel like a small battle. Between copying the right key, starting the SSH agent, and making sure it’s in the right format, it’s easy to get frustrated. Well, I’ve got some ...
Join discussion
Sep 7, 2025 · 2 min read · Step-by-Step SSH Login Flow with Key Pairs How the SSH login mechanism works in the background using key pairs, Step 1: The Client Generates the Key Pair The process begins on your local machine (the client). Using a tool like ssh-keygen, you generat...
Join discussion
Sep 6, 2025 · 4 min read · If you’re managing servers in production, there’s a 99% chance you’re using SSH (Secure Shell) every day. SSH is the backbone of remote administration — it allows us to log into servers, transfer files, and execute commands securely over untrusted ne...
Join discussionSep 2, 2025 · 2 min read · If you’ve ever worked with AWS EC2, you know the PEM file is your lifeline for SSH access. But what happens if you lose it? Can you get it back? And if not, how can you still log in to your instance? Let’s break it down 👇 ❌ Can You Restore a Lost P...
Join discussionJul 24, 2025 · 12 min read · Let’s quickly compare this with correspondence in the cyber realm. When someone sends you a text message, how can you be sure they are who they claim to be? How can you be sure that nothing changed the text as it travelled across various network link...
Join discussionJul 15, 2025 · 8 min read · Hello there, have you ever wanted to understand ssh and how it works ? This should be a friendly guide to help with that, and I’ll try keeping it as simple as possible. This article assumes that you are on a linux machine and have ssh installed, as i...
Join discussion