Be aware reader: this is live blogging which means that this article has been written during the experiment and not after it. For this reason this is just a note, what is contained here can be used to produce a precise checklist of what to do and what NOT to do to get to the achievement.
How to create a vagrant box
Hi all, today i want o build my own box to be used with Vagrant starting from a VirtualBox export.
Today I’ll stay home instead going to the Amsterdam office. I have a terrible headache and i stay better on the dark-silence.
But i want to stay in touch with the office so i start my email, chat, and other web apps, but suddenly I realize that probably in the office, my colleagues hear a sound for each chat, email i receive and calendar alarms as well.
So I wanted to shut down my pc speaker in the office from ssh.
It is not totally correct saying:SSH login with certificate as actually a public/private keypair is used for this type of authentication.
Let’s see how it works.
This explains how to login to your remote linux machine ssh instance with a public keys pair authentication and (more) optionally, how to not use any password, just the private and public keys pair. Continue reading “SSH login with certificate”
Incoming search terms:
blog giuseppeurso net (1287)
ssh_exchange_identification: read: connection reset by peer (120)
Questo è il log AGGIORNATO della mia prossima avventura nel paese delle meraviglie (che poi sarebbe Debian) in cui utilizzerò 2 Virtual Machines, una delle quali sarà ottenuta partendo da un clone della macchina originale da tenere sotto mirroring, ed agirà da mirror venendo aggiornata 4 volte al giorno.
I don’t usually produce redundancy copying articles from other’s websites, but after happened to a website (cannot mention, but it was suddenly closed), i decided to keep it (until its license grants me to keep it).
Using Rsync and SSH
Keys, Validating, and Automation
This document covers using cron, ssh, and rsync to backup files over
a local network or the Internet. Part of my goal is to ensure no user
intervention is required when the computer is restarted (for passwords,
keys, or key managers).