Blog Archives

Remote Connections to mysql

By default remote access to the MySQL database server is disabled for security reasons. The standard configuration of MySQL is intended to be as fast as possible, so encrypted connections are not used by default. If we want to allow remote

Posted in Linux, MySQL, Security

SSH fingerprints

Whenever we use SSH to connect to a new host, we usually see the following prompt asking us to confirm the fingerprint: $ ssh The authenticity of host ‘’ ( can’t be establised ECDSA key fingerprint is c8:2c:22:6d:13:…..29:b4:86:8d:13. Are

Tagged with: ,
Posted in Linux, Security

Fabric (SSH & passwords)

Option 1 – provide password with -p flag fab -H hostname -p password123 … Downside: password will show up in process listing Downside: password will show up in command history Option 2 – get prompted for password fab -I Initial

Posted in Fabric, Linux, Python, Security

SSH without password

Easy guide to follow: Summary: Use PuttyGen.exe to generate rsa key Copy the public key into ~/.ssh/authorized_keys Save the private key on desktop Load private key into putty under SSH > Auth Permissions: chmod 700 ~/.ssh chmod 600 ~/.ssh/authorized_keys

Posted in Linux, Security