One of the most common security tips for Linux servers is to disable password authentication for root and use SSH Keys. SSH Keys allow you to login as that specified user without the need for a password. This functionality helps you add and manage SSH Keys for the ‘root’ user on your server. This will […]
Linux has an SSH protocol that enables the remote users to connect and perform the operations, just like RDP is a protocol that works with Windows for the remote desktop. In this article, we will thoroughly explain how to use SSH and the basic commands of the SSH, and its usage. What is SSH? Secure […]
Every Linux administrator has a crucial job to monitor, manage and deploy the webserver and its services. RAM is one of the top priority components that Linux administrators take a look at frequently, using any monitoring tool or manual methods. There are a few different ways of accomplishing this, depending on your preference and system […]
Email headers are nothing but HTML snippet which contains information of the sender, recipient, email’s route. This article will learn how to view the body and the header of a queued Exim message. How to view exim queued email header? Use the following command to check the Exim email header, Example, How to view exim […]
If you’re looking to manage Linux operating system-based machines remotely, you can take the help of SSH protocol like we do RDP for Windows-based machines. In this article, we will be covering multiple platforms and a guide on how to connect with SSH? Windows For the Windows operating system, we don’t have a direct application […]
The default SSH port on all Operating Systems is port 22. For security measures, KnownHost’s servers are configured to use port 2200. Changing your SSH port The server’s SSH configuration file is located here: /etc/ssh/sshd_config SSH into your server as the root user. ssh root@<ip address> -p 2200 Open the configuration file with your favorite text […]
What is Secure Shell? Secure SHell (SSH), sometimes known as Secure Socket Shell, is a UNIX-based command interface and protocol for securely getting access to a remote computer. It is widely used by network and systems administrators to control Web and other kinds of servers remotely. Creating an SSH Key It is simple to create an […]