With all those new Mobile Devices that are capable to display and handle any kind of data, it is only reasonable to provide your Online content to as much devices as possible and not only Computer.
In this post you will see how easy it is to setup a mobile version of your Website without any Modules or Online Services that are being offered around. Read More
Month: June 2015
Direct ssh access between two unix system/access two unix system without password
if [ -z “$1″ ]; then echo “usage: ssh-uploadkeys user@host” else if [ -e “$HOME/.ssh/id_dsa.pub” ]; then echo “SSH public key found: ~/.ssh/id_dsa.pub” else echo -e ‘\n\n’|ssh-keygen -t dsa -N ” fi cat ~/.ssh/id_dsa.pub| \ ssh $1 ‘cat > tero-authorized_keys && mkdir -p $HOME/.ssh/ && chmod 0700 $HOME /.ssh/ && cat tero-authorized_keys >> .ssh/authorized_keys && chmod 0600 .ssh/authorized_keys && rm tero-authorized_keys && echo “Success, next time you do not need to type password.”||echo “SSH key generation or upload failed.”‘ fi
login banner Linux
To create a banner so that whenever a user logs into a system will see some default text, you can couple of options
1. put the default text into /etc/motd
2. type echo “<the text you want to display>” into /etc/profile
3. type echo “<the text you want to display>” into user home .profile file. Read More
Using /etc/hosts.allow and /etc/hosts.deny to secure Linux
TCP wrapper based access List Rules can be included in the two files
/etc/hosts.allow and
/etc/hosts.deny . Read More