Commandline
Securing SSH With Passwordless Public Key Authentication
SSH public key authentication adds a ton of security, convenience, and scalability compared to traditional password authentication. Let's see how easy it is to setup, and whether you should use it or not.
read articleUnix Permissions - Part 3: Devising a Security Model
Securing files or systems using learnings from the previous parts of this series about Unix Permissions and their CLI apps.
read articleUnix Permissions - Part 2: chmod and Other Permission Command-line Apps
Exploring various command-line tools for working with Unix Permissions, and taking a deep dive into two of the most important ones: chmod and chown
read articleUnix Permissions - Part 1: Anatomy of Permissions
Diving into the traditional Unix permission system, which is essential for working in the command line on Linux and Unix-like systems. We will explore how the permission system works and how its individual components tie together.
read article