Enabling SSH Root Login on Ubuntu/Debian Linux Servers

Enabling SSH Root Login on Ubuntu/Debian Linux Servers

Securing remote server access is paramount for system administrators and developers. While it’s common practice to disable root login over SSH due to security concerns, there are scenarios where enabling it is necessary, such as when managing a remote server without a user account or for specific administrative tasks. This article guides you through enabling SSH root login on Ubuntu or Debian Linux servers or desktops, ensuring you can access your system with the necessary precautions.

Read more

How to get free SSL/TLS certificates from cli with Let's Encrypt and Certbot

How to get free SSL/TLS certificates with Let’s Encrypt and Certbot

Let’s Encrypt is a Certificate Authority which is able to create and release free SSL/TLS certificates we can use to enable encryption and secure our websites. All the biggest hosting providers allow their customers to request Let’s Encrypt certificates in a user-friendly way, via administration panels like Cpanel or Plesk. If we have SSH access to a remote host, however, we can obtain a Let’s Encrypt certificate from the command line, by using Certbot. In this article, we learn how to install Certbot on the most used Linux distributions, and how to use it to obtain and manage valid Let’s Encrypt certificates.

Read more

Enabling SSH on Ubuntu 24.04

Quick Guide to Enabling SSH on Ubuntu 24.04

Secure Shell (SSH) is an essential protocol for securely accessing networked machines remotely. SSH offers a secure channel over an unsecured network, providing strong authentication and encrypted data communications between two computers connecting over an open network such as the internet. Ubuntu 24.04, like its predecessors, supports SSH for remote administration, file transfer, and more. This guide will walk you through the process of enabling SSH on your Ubuntu 24.04 system, ensuring secure and remote management capabilities.

Read more

how to install keepassxc on linux

How to install KeePassXC on Linux

KeePassXC is a free and open source application we can use to safely manage our passwords and sensitive data. It can store usernames, passwords, URLs, and even file attachments. Data is encrypted and stored locally, in a “kdbx” file: this is the ideal solution if we don’t want to store sensitive information in the cloud.

Read more

Raspberry Pi Debian GNU/Linux comes with absolutely no warranty

Raspberry Pi Debian GNU/Linux comes with absolutely no warranty

Whenever you first log in via SSH to your Raspberry Pi, you are greeted by the “motd” (message of the day). This message includes a bit of text and system information, along with the line Raspberry Pi Debian GNU/Linux comes with absolutely no warranty. If you are getting sick of reading this repetitive information whenever you log in to your Raspberry Pi, then we have good news for you: it is relatively simple to change this message or to disable it completely. In this tutorial, you will see how to change or disable the message of the day (motd) for the Raspberry Pi.

Read more

Enabling SSH on Raspberry Pi: A Comprehensive Guide

Enabling SSH on Raspberry Pi: A Comprehensive Guide

Setting up SSH on a Raspberry Pi allows one or more users to log in to the system remotely for administration or other tasks via a separate command line terminal. SSH is a client-server protocol that provides secure, encrypted connections over a network connection (could be a local network or over the internet). This allows users to SSH into the Raspberry Pi from another Linux system or other SSH client.

Read more

How to bind an ssh public key to a specific command

How to bind an SSH public key to a specific command

In the client-server architecture used by the SSH protocol, a client can authenticate by providing a tunneled clear text password or by using a public/private key pair: this is called public key authentication. A user who logs in via a public key on a remote machine has complete access to the command line; in certain situations, however, it may be useful to associate a public key to a single specific command, for security reasons.

Read more

Linux: Setup SSH

Linux: Setup SSH

The SSH protocol allows Linux administrators to log in to any number of remote systems from their own command line terminal. SSH is a client-server service providing secure, encrypted connections over a network connection. This allows us terminal access to other Linux systems or really any device that accepts SSH connections, such as routers and firewalls, and other operating systems.

Read more

Exit from SSH session

How to disconnect from SSH connection

The SSH protocol in Linux is used to manage remote systems. It works by allowing you to securely log in to a remote device, which could be another Linux system, firewall, router, etc. When you are finished with your remote administration, it will be time to disconnect from the SSH connection. In this tutorial, you will see various ways to disconnect from an SSH connection on a Linux system. You will also learn the escape characters to exit from an SSH session, which comes in handy if you encounter a hung system that you have an SSH connection into and need to return to your local terminal.

Read more

Fixing the 'Cannot Open Display' Error on Linux

Fixing the ‘Cannot Open Display’ Error on Linux

The Cannot Open Display error can occur on a Linux system when trying to open a GUI application, especially if opening it from the command line. It can also pop up if you are trying to use X11 forwarding via SSH to a remote system. The good news is that this error is relatively easy to fix, whether you are getting it when accessing a local application or a remote server. In this tutorial, we will cover the steps necessary to fix the Cannot Open Display error on Linux.

Read more