In this tutorial you will learn how to how to quickly set up a simple, low-requirements, no-database, no-webserver Git repository. All you need is (unprivileged) SSH access and the git program itself.
https://tutorialinux.com/wp-content/uploads/2017/01/TutoriaLinux-Penguin-2-Color-300x272.png00Christianhttps://tutorialinux.com/wp-content/uploads/2017/01/TutoriaLinux-Penguin-2-Color-300x272.pngChristian2016-08-12 19:19:112017-04-30 14:45:05Git: Setting up a low-requirements, personal Git repository
When working with people who don’t use a Unix-based operating system, you’ll often come across the SSH2 Public Key format. PuTTY is probably the most famous software using this format and nearly everyone on Windows uses it. To give these windows ssh users access to a Linux system, SFTP server, Git repository or other systems that use the OpenSSH key format, you need to convert an SSH2 public key into the OpenSSH format. This article describes how to do exactly that.
https://tutorialinux.com/wp-content/uploads/2017/01/TutoriaLinux-Penguin-2-Color-300x272.png00Christianhttps://tutorialinux.com/wp-content/uploads/2017/01/TutoriaLinux-Penguin-2-Color-300x272.pngChristian2016-07-30 10:21:372020-04-13 15:56:53How to convert an SSH2 Public Key into an OpenSSH public key
Sooner or later, we all deploy a PHP web application (Joomla, WordPress, Magento, etc.). I’m currently doing some security work, and I deal with a huge number of sites that have been hacked. The crazy thing is that 90+ percent of these compromises could have been prevented by a few security precautions. Here’s a list of the most common misconfigurations and security holes (from a System Administrator’s perspective), along with how to fix them.
We also look at some of the most popular goals of the attackers (‘consequences’).