Introduction To Setting Up SSH Keys
In this tutorial we are going to setup encrypted SSH Keys for authentication. There are many benefits to this type of setup which include:
No longer needing to enter a password (unless you encrypt your keys with password protection *recommended*)
Once public/private key pair authentication is configured, you can disable password authentication completely and only allow access via the key. Sto...
By jack, March 17, 2015
Introduction to Shell
Q. I just noticed faq about clearing dns cache and there are lots of commands stored in my cache. Can you tell me the command to clear out my command history or cache from a shell prompt?
A. Many programs read input from the user a line at a time. The GNU history library is able to keep track of those lines, associate arbitrary data with each line, and utilize information from previous lines in composing ne...
By tommy, June 3, 2015