What is key based authentication for ssh?
Key based authentication for SSH is a way to connect remotely to another computer/server using an encrypted file you HAVE and an optional password you KNOW to unlock the file. Key based authentication has the advantage of being more secure and/or more convenient.
Password based authentication:
Logging in via password over SSH encrypts your password so it ends up looking like this:
Because the password is encrypted, it won’t be seen in plain text over the wire which is good. If the password is short or simple enough, a hacker will be able to crack your password. Assuming the password is good enough, password based authentication’s strength comes from keeping that knowledge from others.
Key based authentication allows you to connect remotely using an encrypted file as a key instead of a password. Key based authentication gives you the option to continue reading the rest of the article…
Sometimes picking a designer is like finding a good restaurant, you either have to go there and try the food or ask a bunch of your friends where the best place to eat is. Well, I’m your friend and I found an AWESOME restaurant!! Actually, not a restaurant but an awesome designer!!! His name is Preston Lee and I highly recommend you follow his blog, join the conversation with him on Twitter, AND use his ninja rock star design skills for what ever you need designing for. I recently had Preston design some business cards for me and I was floored with the whole experience and the results. Quick results, rockin designs, and was a ton of fun to work with.
I just recently started continue reading the rest of the article…
Having an insecure wireless network makes you liable for arrest or lawsuit! If you have not done all these things listed below to protect your wireless network, take the few minutes it will take to do the basics and DO THEM NOW!!
There is no excuse for not doing all these things
- Change default user name & passwords for routing equipment
- Use strong passwords
- Turn on encryption (WPA2 or better. WEP is hackable in minutes)
- Change default SSID
- Enable firewalls
- Turn off when not in use
- Update router firmware to the latest version
Increases security but may require more time or expertise
- Disable DHCP and assign static IP Addresses
- Filter by MAC address
- Monitor network for intrusions
- Use software to test for network vulnerabilities
Did you know that you can be arrested or be sued if your wireless network is insecure? If you have an insecure wireless router at home, someone could use your internet connection to start downloading child pornography, attack the NSA, send spam, release viruses, or hack your own computer and steal your identity! So when the police or NSA come knocking at your door how are you going to prove that you didn’t do it? All that activity will be traced back to your IP address and you will need a really good argument to convince them otherwise. But why waste your time, money, and possibly your identity by not taking a few minutes to secure your network? What about businesses that have wireless networks set up? If a business has an insecure wireless network, hackers can use that to steal information by monitoring the network or compromising computers on that network. If that happens, patients, customers, and employees are all at risk of having their private information stolen. Not good!
Lets step through the basics of what everyone should do to secure their wireless network.
continue reading the rest of the article…
This error in Flash
TypeError: Error #2007: Parameter child must be non-null
was caused by the fact that I had not dragged the progressbar component into my library just like a problem I had before posted at http://geek.michaelgrace.org/2009/11/1172-definition-fl-controlstilelist-could-not-be-found/
This is now the second time I have done this and hopefully the last. ; )
Goodbye Flash error “TypeError: Error #2007: Parameter child must be non-null” I don’t want to see you again!