Skip to main content
What is ssh?

SSH, or Secure Shell, is a protocol used to securely log onto remote systems. It is the most common way to access remote Linux and Unix-like servers.

ssh commands:

If your username on the remote system is the same as your username on your local system:

                              #ssh remote_host

remote_host means ip address or domain name that you are trying to connect to.

If your username is different on the remote system, you can specify it by using this syntax:

                     #ssh remote_username@remote_host

How to Set Up SSH on Linux systems

Edit the configuration file of sshd

#vim /etc/ssh/sshd_config
It may be a good idea to change this to a non-standard port to help obscure your server from random port scans. If you do change your port, we will show you how to connect to the new port later on.

  HostKey /etc/ssh/ssh_host_rsa_key
 HostKey /etc/ssh/ssh_host_dsa_key
 HostKey /etc/ssh/ssh_host_ecdsa_key

If you are having difficulties with SSH, increasing the amount of logging may be a good way to discover what the issue is.

LoginGraceTime 120    (LoginGraceTime specifies how many seconds to keep the connection alive without successfully logging in.)

PermitRootLogin yes     (PermitRootLogin selects whether root is allowed to log in.)

StrictModes yes      (strictModes is a safety guard that will refuse a login attempt if the authentication files are readable by everyone.)
 
Determine if the SSH server service sshd is running.
                         #service sshd status

If the SSH server service sshd is not running, start this daemon.
                          #service sshd restart

If the service is running, no further action is required.

Comments

Popular posts from this blog

Problem: Date Formatting cannot be Changed in Microsoft Excel

In this article, we will learn how to change the date formatting. We will use “Text to Column” wizard to resolve the problem of change the date formatting in Microsoft Excel. Let’s understand the functions: - Text to Column:  “Text to Column” is used for separating the cell content which is depending on the way your data is arranged. You can divide the data on the basis of content in the cell such as space, comma, period, semicolon, etc. Let’s take an example and understand how we can convert the date into Text. We have dates, foramatted as text in column A. Now, we want to convert it into date format.     If we want to convert the formatting into numbers, then we need to follow below given steps:- Select the range A2:A11. Go to Data tab, and click on Text to Columns from the Data tools group.     Covert Text to Columns Wizard – Step1 of 3 dialog box will appear. Select fixed width, and click on Next button.     Skip step-2, and...
How To Remove Gphone Virus Well gphone.exe is nowadays one of the most dangerous virus spreading very rapidly. It is a Trojan and changes your IE homepage and sends tries to open gtalk and yahoo messenger. It even sends messages to gtalk contacts. Its icon is just like that of folder icon and people thinking of folder click on it get infected by the virus. Gphone virus basically is a 260 kb .exe file which looks like a folder and it can take any name of any other folder if you have clicked on the virus folder which looks like a folder but it is not. If you have a folder name ―movies‖ in your D drive it will make a exe file in the folder named movies.exe and if you click on that exe file it too work as a virus. It makes .exe files in all the folders you have with the name of the folder. How to remove this virus Method 1 1. Go to Task Manager then Processes and then click on gphone.exe and click on end process. 2. Manually go to folder where gphone.exe is present and delete it. 3...