August 14, 2022

SSH Essentials: Working with SSH Servers, Clients, and Keys

SSH is a secure protocol used as the primary means of connecting to Linux servers remotely. It provides a text-based interface by spawning a remote shell. After connecting, all commands you type in your local terminal are sent to the remote server and executed there. In this cheat sheet-style guide, we will cover some common ways of connecting with SSH to achieve your objectives. This can be used as a quick reference when you need to know how to connect to or configure your server in different ways.

SSH Essentials: Working with SSH Servers, Clients, and Keys Read More

How To Configure SSH Key-Based Authentication on a Linux Server

SSH, or secure shell, is an encrypted protocol used to administer and communicate with servers. When working with a Linux server you may often spend much of your time in a terminal session connected to your server through SSH. While there are a few different ways of logging into an SSH server, in this guide, we’ll focus on setting up SSH keys. SSH keys provide an extremely secure way of logging into your server. For this reason, this is the method we recommend for all users.

How To Configure SSH Key-Based Authentication on a Linux Server Read More

What is the Linux Kernel and What Does It Do?

A kernel is the lowest level of easily replaceable software that interfaces with the hardware in your computer. It is responsible for interfacing all of your applications that are running in “user mode” down to the physical hardware, and allowing processes, known as servers, to get information from each other using inter-process communication (IPC). Linux kernel is a free, open-source, monolithic, modular, Unix-like operating system kernel. It is the main component of the Linux operating system (OS) and is the core interface between the computer’s hardware and its processes.

What is the Linux Kernel and What Does It Do? Read More

Linux Permissions Basics and How to Use Umask on a VPS

Linux permissions allow a file or directory owner to restrict access based on the accessor’s relationship to each file. This allows for control schemes that provide varying levels of access to different people. The umask command is used to determine the default permissions assigned to files created by each user. It can be modified to provide strict security restrictions or relaxed permissions for file sharing scenarios, depending on the needs of the system and user. This guide will explain the basics of Linux permissions, and will demonstrate the usefulness of configuring umask correctly. It will also briefly cover the chmod command as an associated permissions tool.

Linux Permissions Basics and How to Use Umask on a VPS Read More

What is Linux? Everything About Linux for Beginners

Linux is a kernel originally developed by Linus Torvalds for hobby purposes. Later, with his famous message to the newsgroup, it became the operating system of today. The understanding of the development, use, distribution, and sharing of software products independent of individuals, institutions, and organizations has created the concept of free software. The first thing that comes to mind in this context is the GNU/Linux operating system developed by Linus Torvalds from the beginning and supported by a large number of volunteer programmers communicating over the Internet.

What is Linux? Everything About Linux for Beginners Read More

What is Linux Operating System? Introduction to Linux OS

Just like Windows, iOS, and Mac OS, Linux is an operating system. In fact, one of the most popular platforms on the planet, Android, is powered by the Linux operating system. An operating system is software that manages all of the hardware resources associated with your desktop or laptop. To put it simply, the operating system manages the communication between your software and your hardware. Without the operating system (OS), the software would not function.

What is Linux Operating System? Introduction to Linux OS Read More