Monday, April 19, 2021

Jeremy M. Jones

Practical Security: Creating SSH Tunnels

In a previous article, I went over some of the basic functions of ssh. In that article, I mentioned that simple remote shell access...

Mastering SSH: Connecting, Executing Remote Commands and Using Authorized Keys –

The ssh command line utility is a staple for people who work on remote systems. ssh stands for "secure shell," so as you may expect...

Linux and UNIX How To: Scripting SSH and SFTP

SSH is an indispensable tool that I use every day for file transfers, remote execution of tasks, setting up network port redirection between systems (tunneling),...

Creating a Daemon with Python

If you are an average internet user, then you interact with daemons every day. This article will describe what daemons do, how to create them...

Building Command Line Utilities with Python

When you write code, whether in Python or some other language, you probably have a goal that you or someone else will one day run...

Latest Articles

IT Planning During a Crisis

Without a doubt, 2020 changed everything. I like to compare it to a science fiction movie where time travel is involved. Clearly, we have...

Best Data Quality Tools &...

Data quality is a critical issue in today’s data centers. The complexity of the Cloud continues to grow, leading to an increasing need for...

NVIDIA’s New Grace ARM/GPU Solution...

This week is NVIDIA’s GTC, or GPU Technology Conference, and they likely should have changed the name to ATC because this year – it...

What is Data Segmentation?

Definition of Data Segmentation Data segmentation is the process of grouping your data into at least two subsets, although more separations may be necessary on...