Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT
ADVERTISEMENT

Links 1 through 10 of 23 by @nm tagged PrivacyAndSecurity/ssh

'portaPuTTY is a hacked version of PuTTY that stores all its information in files, not in the registry. I made this version so I could have a good SSH client to run from a USB drive.'

Share It With Others!

'pssh is a free, open-source SSH 2 client for Palm OS 5.'

Share It With Others!

Share It With Others!

'We'll take the Identity/Pubkey trust we created last time, and learn how to use the ssh-agent program as our keymaster. We'll decrypt our keys once, put them in into the agent, and have it handle all our authentication needs thereafter.'

Share It With Others!

'The goal of using Identity/Pubkey authentication is to remove the need for static passwords. Instead of providing a password, which could be captured by a keystroke logger or witnessed as you type it, you have a key pair on your disk that you use to auth

Share It With Others!

Share It With Others!

Share It With Others!

'The problem is DNS lookup timeout. Editing /etc/hosts provides a quick fix for any given client, but does not eliminate the problem.'

Share It With Others!

Share It With Others!

'I try to guess from certain heuristics whether I'm online and where I am. I use this result to either select a specific SMTP server within the same LAN or to connect to a shell account via ssh and use its local sendmail daemon or to queue the mail if I'm

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT