Git: Agent admitted failure to sign using the key

Just as an internal note, if you get the following error trying to pull or push to a git repo: “Agent admitted failure to sign using the key” Your issue might be due to simply not having an identity defined…

More Details
Using SSH for tunneling

A very useful resource (in French) to use SSH, with specific use cases: Les_tunnels_SSH Another useful (and short one for tunneling): http://www.howtoforge.com/reverse-ssh-tunneling Connecting to another remote computer through a common central computer In short, if you have a configuration with…

More Details
Easily avoid using your password in an SSH connexion: ssh-copy-id

On Linux systems, there used to be a mildly complicated but tedious way to allow you to SSH another computer using your public key, which involved finding and copying your public key on the other host, then connecting to the…

More Details
Why using root on UNIX/Linux is bad ?

A lot of people use the root account to do anything they need, just because it is easier… This is a really bad idea, as that user can do anything to the system. Not only can he access/delete/modify any file…

More Details
SSH

SSH (the Secure SHell) is a secure replacement for many UNIX tools like telnet, ftp, rsh, rcp, rlogin, rexec, and many more, which have proven to be insecure, even if most UNIX systems still use them by default, and even…

More Details
HOWTO Autocomplete hostnames with bash while using SSH

This article was first written in October 2007 for the BeezNest technical website (http://glasnost.beeznest.org/articles/364). On most GNU/Linux distributions, bash is able to read hostnames in  /.ssh/known_hosts to autocomplete ssh commands. For security reasons though, hostnames are no longer stored in…

More Details

Quick Contact Form