Expanding an EBS volume is not quite as easy as recreating it from a snapshot with a larger volume size. It involves a few more steps.
How to set up an SSH connection using authentication based on private-public key pairs
In order to transfer files from one server to another you can use Unix tools such as rsync with key pairs. Setting up the connection is rather easy once you know how to do it.
How keys work in public key cryptography
Public key cryptography relies on the use of a key pair that consists of a private and a public key. These two text strings can be compared against one another using a cryptographic algorithm. If the verification succeeds, access is granted.
Think of the public key as the lock on a door. It is technically available to everyone, but can only be opened with the corresponding private key.
In public key cryptography, your private key is like the master key of an apartment house in the real world: it can open all the locks on any door anywhere (for one and only private key, it is possible to generate many public keys).
Public key cryptography relies on an analogy to a lock and a key in the real world; animation by — Vala Afshar (@ValaAfshar) via Twitter
In order for the origin host (ec-instance-01) to be able to connect to the target host (ec-instance-02), you need to follow these steps:
- create a key pair in the .ssh directory on the origin host (the one that will be initiating the connection); the private key of this key pair should never leave this host!
- append only(!) the public key from this pair to the authorized_keys file of your user on the destination host.
Here is how to do this in more detail.
How to Install PHP 7 on Fedora, RHEL, CentOS 7 — the Red Hat family
Installing PHP on the Red Hat family—Fedora, RHEL, CentOS 7—is a must for cyber security and it’s not rocket science. With a few easy steps, you too can bring your PHP based web applications to the next level.
The LEMP stack: NGINX, MariaDB/MySQL, PHP 7.x on RHEL/Fedora/CentOS with SELinux
The setup of the LEMP stack (NGINX, MariaDB or MySQL, and PHP) has many caveats. They can impact both performance and security.
Here is how to LEMP (not limp along!).
Tip of The Day: Test Your Web Server’s Crypto Prowess for TLS, Diffie-Hellman, and more
Are you concerned about the security of data transmissions in which your web server participates day in and day out? Passwords, user names, credit card numbers, and other sensitive private communications on the Internet can easily be compromised unless you actively take precautionary measures and preempt the most common exploits by means of modern cryptography. Your users trust that you will protect them. The only question is: how do you measure success?
- « Previous Page
- 1
- …
- 9
- 10
- 11
- 12
- 13
- Next Page »