Thursday, August 5, 2021

Jeremy M. Jones

Practical Security: Creating SSH Tunnels

In a previous article, I went over some of the basic functions of ssh. In that article, I mentioned that simple remote shell access...

Mastering SSH: Connecting, Executing Remote Commands and Using Authorized Keys –

The ssh command line utility is a staple for people who work on remote systems. ssh stands for "secure shell," so as you may expect...

Linux and UNIX How To: Scripting SSH and SFTP

SSH is an indispensable tool that I use every day for file transfers, remote execution of tasks, setting up network port redirection between systems (tunneling),...

Creating a Daemon with Python

If you are an average internet user, then you interact with daemons every day. This article will describe what daemons do, how to create them...

Building Command Line Utilities with Python

When you write code, whether in Python or some other language, you probably have a goal that you or someone else will one day run...

Latest Articles

Data Belongs in the Cloud....

In 2012, IBM made an oft-quoted claim that 90 percent of the world's data has been created in the last two years. They grossly...

Google Cloud Rolling Out Zero-Trust...

WASHINGTON, D.C. — Google Cloud is helping the government sector with zero trust. The set of services are designed to help U.S. federal, state, and...

CFOs Committing to Digital in...

STAMFORD, Conn. — More CFOs are planning to increase their spending on digital than any other part of the business in 2021. Eighty-two percent of...

SAP and IBM Partnering on...

WALLDORF, Germany and ARMONK, N.Y. — SAP and IBM are working together to help financial institutions accelerate cloud adoptions and “modernize operations.” SAP plans to...