Amazon web services. The perfect alternative to a locally hosted server solution.

Amazon Web Services is the perfect solution for hosting a server outside your organization. This allows you to create a cloud hosted database server that takes the strain off your local server infrastructure using Microsoft SQL server 2012 or a Linux based solution in a cloud hosted server instance. There is a free trial that … Read more

Downloading a torrent file using the transmission-cli utility over SSH.

The transmission-cli command allows a user to download a torrent file or magnet link using the command line. This is good for downloading a torrent on your home machine over SSH. Type sudo apt-get install transmission-cli to install this useful addon to Transmission. [1]homer@deusexmachina ~ $ transmission-cli http://torcache.net/torrent/B798B2EFF12458D23B53E2110E861411DB44517A.torrent?title=[kickass.to]dawn.of.the.planet.of.the.apes.2014.untouched.hindi.dubbed.scamrip.sumoman transmission-cli 2.81 (14128) [15:32:18.495] Transmission 2.81 (14128) … Read more

A good guide to creating SSH keys and disabling the password for an SSH login.

This guide I just used used allows a Linux user to disable the password and enable SSH keys to manage logins to an SSH server. http://lani78.com/2008/08/08/generate-a-ssh-key-and-disable-password-authentication-on-ubuntu-server/. This is very useful, you can access your machine remotely and without requiring the user to remember a complex password. if you are on Windows, the Bitvise SSH client … Read more

Some useful Linux scripts for the desktop Linux user who likes the command line.

There are many useful Linux tips that make the life of a Linux user much easier. One is for the VI or VIM editor. To open a file at a specific line; use this command. homer@deusexmachina ~/Documents/yadex-1.7.901 $ vim src/x11.h +33homer@deusexmachina ~/Documents/yadex-1.7.901 $ vim src/x11.h +33 This will open the file x11.h at line 33. … Read more

Watchdogs game showcasing more realistic hacking with Linux and SSH; but the crashes spoil this fine game.

The watchdogs game is a new shooter game that uses strategies such as hacking into phones and streetlights to achieve various game strategies. The intro shows a reverse SSH tunnel and various Linux hacking tools that the protagonist and his friends use against the enemies. This is rather common in modern films as well, Dredd … Read more

Useful things that you can do with putty to access your home Internet connection from work or school.

The putty ssh client allows you to access your home computer over the Internet using ssh; but you can also tunnel past a proxy and access websites using putty. This means that you can access your home Internet connection through a proxy easily. You need to use port 443 in your openssh configuration to enable … Read more

How using ssh is a better way to access your remote machine. How to do this over port 443.

Using the ssh command to connect to a remote computer is a very good way to access your home machine when you are at college or at work. But sometimes you are behind an academic proxy and this blocks your ssh access. I had that problem and I used putty to connect to my home … Read more

Logging into an Ubuntu Server 12.04 machine over the network with Windows 7 or Vista.

Using the Putty application to log into an Ubuntu server is very easy; simply download Putty from here: PuTTY download site and then run the executable which will be in your Users\Downloads folder in Windows 7. Then enter the IP address and port used by SSH on the remote server. The default is 22. Then … Read more

The Ubuntu phone Linux distribution will come with a terminal application.

The new Ubuntu phone Linux distribution will come with a terminal application. This means that users of a mobile device will be able to use the bash shell on their mobile device to use various networking commands on the phone as well as other useful Linux commands that make the Linux shell so powerful. Hopefully … Read more

Usage of computers in the movies. Some get it wrong. The Matrix and Tron Legacy are the exceptions.

The usage of computers in movies has always been quite hit and miss. The Matrix Reloaded movie had realistic depictions of the usage of the NMAP port scanning command and the use of the ssh command to login remotely to the target machine and execute commands to shutdown the power plants to buy the keymaster … Read more