encryption

All posts tagged encryption by Linux Bash
  • Posted on
    Featured Image
    In the digital world, security is a paramount concern for everyone, from individual users to massive corporations. One of the cornerstone technologies enabling secure communications on the internet today is the use of public and private keys. This fundamental concept in cryptography keeps our data safe and ensures privacy in all online transactions. Whether you're a seasoned developer, a system administrator, or simply a curious tech enthusiast, understanding how to create and manage these keys is essential. Public and private keys form the heart of asymmetric cryptography, also known as public-key cryptography. This method involves two keys: one public and one private.
  • Posted on
    Featured Image
    In today's interconnected world, the ability to access computers remotely has become essential for many IT professionals and developers. Secure Shell, commonly known as SSH, stands as a primary tool for safely accessing and managing systems over an unsecured network. This blog post will walk you through the essentials of using SSH to ensure secure remote access, offering both fundamental insights and advanced tips. SSH, or Secure Shell, is a cryptographic network protocol used for operating network services securely over an unsecured network. Typical applications include remote command-line login, remote command execution, and other secure network services between two networked computers.
  • Posted on
    Featured Image
    In a modern world where cyber-warfare is common place and every-day users are targets from organised crime, it goes without saying that you are likely to run into problems rather quickly if you don't use every available means of security. The scope of this article is to connect via SSH Keys however you should also be doing some other more mundane tasks like encrypting the connection (preferably with a VPN on your router) and using altered ports, plus limiting access to SSH users, if you have them. So what is the safest way to connect to your remote Linux OS distribution, by command line? Well quite simply, it is done with SSH Keys which you generate so that the connection can be established.