SSH



Database server setup: enhancing security and performance

  • avatar
  • 1.2K Views
  • 6 mins read
Preview post image

Setting up a robust database server is a critical step in ensuring the smooth functioning of applications and safeguarding sensitive data. In the realm of cybersecurity and efficient data management, employing good practices can make a significant difference. This article explores the advantages of segregating application and database servers, emphasizing the importance of allowing only authorized connections. Additionally, we'll discuss the use of SSH tunnels to enhance security and weigh the pros and cons of such a system.

Connecting to remote server using SSH

  • avatar
  • 2.0K Views
  • 1 Like
  • 6 mins read
Preview post image

Secure Shell (SSH) is a protocol that provides secure command-line access to a remote server. By using SSH, you can remotely log in and run commands as if you were sitting right at the server.

The benefit of using SSH over other methods of remote access is that, as the name suggests, communications are securely encrypted, protecting the traffic flowing to and from the server. Data is encrypted at both ends of the client/server connection using a digital security certificate and access credentials are also protected.

Sync local and remote directories with Rsync

  • avatar
  • 1.2K Views
  • 1 Like
  • 4 mins read
Preview post image

Rsync is a very flexible network-enabled syncing tool. Due to its ubiquity and its popularity as a tool for system scripts, it's included on most Linux distributions by default. It efficiently copies and sync files to or from a remote system. It’s faster than scp because rsync uses a remote-update protocol which allows transferring just the differences between two sets of files. The first time, it copies the whole content of a file or a directory from source to destination but from next time, it copies only the changed blocks and bytes to the destination.

 Join Our Monthly Newsletter

Get the latest news and popular articles to your inbox every month

We never send SPAM nor unsolicited emails

Secure File Transfers with SCP

  • avatar
  • 876 Views
  • 1 Like
  • 3 mins read
Preview post image

Secure Copy Protocol, also known as SCP, stands out as a robust yet straightforward solution for securely transferring files between local and remote systems. Let's explore this essential command and understand how it simplifies your file transfer needs without unnecessary complexity.

At its core, SCP is a command-line utility crafted to securely copy files and directories between hosts over an SSH (Secure Shell) connection. What makes SCP particularly handy is its simplicity. With just a single command, you can swiftly move files from your local machine to a remote server or vice versa, all while ensuring the confidentiality and integrity of your data.