≡ Menu

Search: feed

I explained previously how to Perform SSH and SCP without entering password on openSSH. In this article, I’ll explain how to setup the key based authentication on SSH2 and perform SSH/SCP without entering password using the following 10 steps. 1. Verify that the local-host and remote-host are running SSH2. Please note that ssh and scp [...]

{ 13 comments }

   I’ll be posting series of “Productivity Tips for Geeks” on a on-going basis targeted toward geeks who spend lot of time in front of the computer. I hate to use the mouse and use keyboard intensively for all my work. If I perform a single action more than few times using mouse, I’ll try to [...]

{ 20 comments }

  PERC/CERC Configuration utility from DELL is used to manage the disks on the server and perform several disk related activities. for e.g. Create Logical Volumes with different RAID options, check for the consistency of the disks etc. During the server startup process, there is an option to Launch the PERC/CERC configuration utility. However sometimes it [...]

{ 4 comments }

  If you are using SSH client to connect to Linux server from your Windows laptop, sometimes it may be necessary to launch UI application on the remote Linux server, but to display the UI on the windows laptop. Following are two typical reasons to perform this activity: Install software on Linux from Windows: To launch [...]

{ 4 comments }

Protect Your Java Code from Reverse Engineering

 If you are developing java application, it is important to understand that the java class files can be easily reverse engineered using java decompilers. In this article, let us explore how a java class file is reverse engineered and how to protect your source code from being reverse engineered by someone. The java source code [...]

{ 28 comments }

Perform SSH and SCP Without Entering Password on openSSH

In this article, I’ll explain how to perform ssh and scp without entering the password using the SSH Public Key authentication with SSH Agent on openSSH There are two levels of security in the SSH key based authentication. In order for you to login, you need both the private key and the passphrase. Even if [...]

{ 50 comments }

There are only 10 types of people in the world — those who understand binary, those who don’t, and those who understand Gray code About “The Geek Stuff” The main focus of this blog is Linux and Open Source Technologies. I will be posting instruction guides, How-Tos, troubleshooting tips and tricks Linux and open source [...]

{ 2 comments }