An SELinux security policy defines access parameters for every process and resource on the system. It enforces rules for allowing or denying different domains and types to access each other. Using semanage, we can list, edit, add, or delete the different values in the policy, and even export and import our customizations. Let’s learn with […]
semanage Command Examples in Linux
An SELinux security policy defines access parameters for every process and resource on the system. It enforces rules for allowing or denying different domains and types to access each other. Using semanage, we can list, edit, add, or delete the different values in the policy, and even export and import our customizations. Let’s learn with […]
ssh-add: command not found
The ssh-add command adds private key identities to the SSH key agent. If the key is protected by a password, the user only needs to enter the password once, and the agent will automatically authenticate the user. ssh-add has a few decent options available, some of which are handy to know about. -l will allow […]
ssh-add Command Examples in Linux
The ssh-add command adds private key identities to the SSH key agent. If the key is protected by a password, the user only needs to enter the password once, and the agent will automatically authenticate the user. ssh-add has a few decent options available, some of which are handy to know about. -l will allow […]
ssh-copy-id: command not found
OpenSSH includes a program, ssh-copy-id, that installs a public key automatically on a remote server with a single command, placing it into ~/.ssh/authorized_keys: # ssh-copy-id -i key_file [user@]server_name For example, to install the key mykey in the dulaney account on server.example.com: # ssh-copy-id -i mykey dulaney@server.example.com You don’t need to list the .pub extension of […]
ssh-copy-id Command Examples in Linux
OpenSSH includes a program, ssh-copy-id, that installs a public key automatically on a remote server with a single command, placing it into ~/.ssh/authorized_keys: # ssh-copy-id -i key_file [user@]server_name For example, to install the key mykey in the geekuser account on server.example.com: # ssh-copy-id -i mykey geekuser@server.example.com You don’t need to list the .pub extension of […]
SSH Authentication Files in Linux
Each user has the ability to create his or her own set of private and public keys. It doesn’t matter whether the user’s client machine is running Linux, MacOS, or Cygwin on Windows. In all three cases, the procedure is exactly the same. To create the SSH keys simply run the ssh-keygen command as shown […]
cryptsetup: command not found
The cryptsetup command is used as the front-end to LUKS and dm-crypt. The LUKS extensions to cryptsetup support various actions, including the following. LUKS Action Used To luksFormat Format a storage device using the LUKS encryption standard. isLuks Identify if a given device is a LUKS device. luksOpen Open a LUKS storage device and set […]
cryptsetup Command Examples in Linux
The cryptsetup command is used as the front-end to LUKS and dm-crypt. The LUKS extensions to cryptsetup support various actions, including the following. LUKS Action Used To luksFormat Format a storage device using the LUKS encryption standard. isLuks Identify if a given device is a LUKS device. luksOpen Open a LUKS storage device and set […]
shred: command not found
Before encrypting a device, it’s a good idea to overwrite its contents with random data or all zeros. This ensures that no sensitive data from past use remains on the device. The shred command can be used to securely wipe a storage device in this manner. If you encounter the below error while running the […]