Blog Archives

SSH fingerprints

Whenever we use SSH to connect to a new host, we usually see the following prompt asking us to confirm the fingerprint: $ ssh The authenticity of host ‘’ ( can’t be establised ECDSA key fingerprint is c8:2c:22:6d:13:…..29:b4:86:8d:13. Are

Tagged with: ,
Posted in Linux, Security

Network troubleshooting

Here are some basic commands to trouble shoot networking issues: ping ping <hostname> send ICMP ECHO_REQUEST to network hosts ping uses ICMP protocol (ports are only for TCP/UDP) Check to see if a host is reachable from our computer nmap

Tagged with: ,
Posted in Linux, Networking

Zip commands

zip files zip <> <files-to-compress> — unzip unzip <file.jpg> -t test file -l list files from archive -j do not make directories tar files tar xvf archive.tar Z (compressed) files tar -xZf archive.tar.gz tar -C /tmp/test archive.tar.gz #extra

Tagged with:
Posted in Linux