Securing remote server access is paramount for system administrators and developers. While it’s common practice to disable root login over SSH due to security concerns, there are scenarios where enabling it is necessary, such as when managing a remote server without a user account or for specific administrative tasks. This article guides you through enabling SSH root login on Ubuntu or Debian Linux servers or desktops, ensuring you can access your system with the necessary precautions.
ssh
How to get free SSL/TLS certificates with Let’s Encrypt and Certbot
Let’s Encrypt is a Certificate Authority which is able to create and release free SSL/TLS certificates we can use to enable encryption and secure our websites. All the biggest hosting providers allow their customers to request Let’s Encrypt certificates in a user-friendly way, via administration panels like Cpanel or Plesk. If we have SSH access to a remote host, however, we can obtain a Let’s Encrypt certificate from the command line, by using Certbot. In this article, we learn how to install Certbot on the most used Linux distributions, and how to use it to obtain and manage valid Let’s Encrypt certificates.
Quick Guide to Enabling SSH on Ubuntu 24.04
Secure Shell (SSH) is an essential protocol for securely accessing networked machines remotely. SSH offers a secure channel over an unsecured network, providing strong authentication and encrypted data communications between two computers connecting over an open network such as the internet. Ubuntu 24.04, like its predecessors, supports SSH for remote administration, file transfer, and more. This guide will walk you through the process of enabling SSH on your Ubuntu 24.04 system, ensuring secure and remote management capabilities.
How to install KeePassXC on Linux
KeePassXC is a free and open source application we can use to safely manage our passwords and sensitive data. It can store usernames, passwords, URLs, and even file attachments. Data is encrypted and stored locally, in a “kdbx” file: this is the ideal solution if we don’t want to store sensitive information in the cloud.
How to install and configure Fail2ban on Linux
Fail2ban is a free and open source software we can use to mitigate brute force and DoS/DDoS attacks: it scans log files for multiple failed authentication attempts and bans related IP addresses by creating ad-hoc firewall rules.
Raspberry Pi Debian GNU/Linux comes with absolutely no warranty
Whenever you first log in via SSH to your Raspberry Pi, you are greeted by the “motd” (message of the day). This message includes a bit of text and system information, along with the line Raspberry Pi Debian GNU/Linux comes with absolutely no warranty
. If you are getting sick of reading this repetitive information whenever you log in to your Raspberry Pi, then we have good news for you: it is relatively simple to change this message or to disable it completely. In this tutorial, you will see how to change or disable the message of the day (motd) for the Raspberry Pi.
How to enable X11 forwarding on Raspberry Pi
Enabling X11 forwarding on the Raspberry Pi will allow you to run graphical applications on the device from your remote PC. This has some advantages over using xrdp or VNC on your Raspberry Pi, since the applications will look better since they are running on your local PC. In this tutorial, you will see how to enable X11 forwarding on a Raspberry Pi.
Enabling SSH on Raspberry Pi: A Comprehensive Guide
Setting up SSH on a Raspberry Pi allows one or more users to log in to the system remotely for administration or other tasks via a separate command line terminal. SSH is a client-server protocol that provides secure, encrypted connections over a network connection (could be a local network or over the internet). This allows users to SSH into the Raspberry Pi from another Linux system or other SSH client.
How to bind an SSH public key to a specific command
In the client-server architecture used by the SSH protocol, a client can authenticate by providing a tunneled clear text password or by using a public/private key pair: this is called public key authentication. A user who logs in via a public key on a remote machine has complete access to the command line; in certain situations, however, it may be useful to associate a public key to a single specific command, for security reasons.
Linux: Setup SSH
The SSH protocol allows Linux administrators to log in to any number of remote systems from their own command line terminal. SSH is a client-server service providing secure, encrypted connections over a network connection. This allows us terminal access to other Linux systems or really any device that accepts SSH connections, such as routers and firewalls, and other operating systems.
How to disconnect from SSH connection
The SSH protocol in Linux is used to manage remote systems. It works by allowing you to securely log in to a remote device, which could be another Linux system, firewall, router, etc. When you are finished with your remote administration, it will be time to disconnect from the SSH connection. In this tutorial, you will see various ways to disconnect from an SSH connection on a Linux system. You will also learn the escape characters to exit from an SSH session, which comes in handy if you encounter a hung system that you have an SSH connection into and need to return to your local terminal.
Fixing the ‘Cannot Open Display’ Error on Linux
The Cannot Open Display
error can occur on a Linux system when trying to open a GUI application, especially if opening it from the command line. It can also pop up if you are trying to use X11 forwarding via SSH to a remote system. The good news is that this error is relatively easy to fix, whether you are getting it when accessing a local application or a remote server. In this tutorial, we will cover the steps necessary to fix the Cannot Open Display
error on Linux.