How to secure your Linux environment with Nitrokey USB smart card

With the mounting online security risks, simple one-step security no longer suffices, and people resort to multiple layers of security to thwart increasingly sophisticated attacks on their digital assets and online privacy. An advanced form of security defense often employed in financial sectors and other corporate environments is hardware-based protection, where a tamper-proof physical security […]
Continue reading…

 

How to use Mutt email client with encrypted passwords

Mutt is an open-source email client written for Linux/UNIX terminal environment. Together with Alpine, Mutt has the most devoted followers among Linux command-line enthusiasts, and for good reasons. Think of anything you expect from an email client, and Mutt has it: multi-protocol support (e.g., POP3, IMAP and SMTP), S/MIME and PGP/GPG integration, threaded conversation, color […]
Continue reading…

 

How to force ssh login via public key authentication

There is ongoing debate on the pros and cons of using passwords versus keys as ssh authentication methods. A main advantage of key authentication is that you can be protected against brute-force password guessing attacks. However, requiring a private key for ssh access means that you have to store the key somewhere on client system, […]
Continue reading…

 

How to ssh to EC2 instance at Amazon AWS

After you have created an EC2 instance at Amazon AWS, you can access the instance via ssh. In order to do so, you need two pieces of information: (1) private key file associated with your instance and (2) public DNS of your instance. The private key file for your EC2 instance should have become available […]
Continue reading…

 

How to specify a private key file in ssh

If you ssh to a remote server which only accepts key authentication, you need to present your private key to the ssh server for authentication. It is straightforward to do so by using ssh’s command line option. But what if you have many different servers each of which happens to require different private keys? It […]
Continue reading…