Encryption and Security
Data encryption is important to maintain data confidentiality, keeping your personal information secure.
Easy file encryption using openssl
If you're new to encryption or simply want to encrypt a file but don't want to bother setting up a public/private key pair (required by …
Encrypted data transfer using cryptcat
If you like Netcat but don't want to use it because it offers no encryption you should take a look at Cryptcat, It allows the …
GPG encryption guide part 1
Learn how to use military-grade encryption using GPG. This is the first in a series of guides that will teach you about using gpg for …
GPG encryption guide part 2 (asymmetric encryption)
This is the next post in our series of GPG guides. Here, we cover asymmetric encryption and decryption of data using the gpg command.
GPG encryption guide part 3 (digital signatures)
This GPG guide covers how to digitally sign data in various ways, explains the purpose of digital signatures, and shows how to verify them.
GPG encryption guide part 4 (symmetric encryption)
This GPG guide covers how to use the gpg command for simple yet strong symmetric encryption using various different block cipher algorithms.
Allow multiple SSH sessions over an existing connection
Enabling SSH connection sharing allows you to reuse an existing ssh connection thus saving resources and removing the need to enter a password. Here, we'll …
Installing SSH daemon (sshd)
OpenSSH is at the top of the pile of utilities you can use for encrypted data transfer. Here, we'll cover how to install the server …
Secure encrypted communications using OpenSSH
OpenSSH is an implementation of SSH (secure shell) which is used for secure communication between two machines (a client and a server). OpenSSH is the …
Secure file transfer using SFTP
In this post, we'll run through the commands that will allow you to use SFTP to securely transfer files from one machine to another using …
Securely copy files remotely using SCP
Secure copy (or scp as the program is called) is a program used to securely copy files between hosts on a network. In this post …
Using a public/private key pair for auto SSH login
In this post we cover how using a public/private key pair for SSH, you can enable automatic login to remote machines and (if you use …
Using SSHFS to securely mount remote file systems
Securely mount remote file systems easily with sshfs. Edit remote files in your favourite GUI editor locally as if they were present on your own …