This article describes how to log into the remote computer (server) using SSH and run a GUI (graphical) application that requires screen. The GUI program will be displayed on the physical monitor, connected to that remote machine. Run a GUI Program on a Remote Computer’s Screen The Basic Procedure Log into a remote machine using […]
ssh
SSH Login Slow — Removing Delay
Problem: When I’m trying to log into the remote server via SSH, after I enter the UserName, it takes a lot of time before it displays the Password prompt. How to solve this problem? Solution: Basically, a long delay during authentication process is caused by “GSS API Authentication method” or/and by “UseDNS” option. The solution […]
3 Steps to Perform SSH Login Without Password
It is very easy to perform SSH login to the remote server without prompting a password. With a help of utilities from OpenSSH package, you can generate authentication keys on your local machine, copy public key to the remote server and add identities to your authentication agent. Just three simple steps separate you from the […]
10 Examples: Copying Files over SSH
SCP (Secure CoPy) – is a remote file copy program, that copies files between hosts on a network. It uses SSH for data transfer, and uses the same authentication and provides the same security as SSH. When copying a source file to a target file which already exists, SCP will replace the contents of the […]
Fast Connection with SSH Aliases
If you need to regularly connect to a lot of different servers over SSH, this trick is for you. Editing SSH configuration file and adding SSH aliases will make the process of the remote connection much more convenient. Edit SSH configuration file for current user: $ vi ~/.ssh/config or edit the main configuration file, if […]
SSH with Public Key-Based Authentication
To improve the system security and to enable running automated maintenance tasks on other machines, you can use the key-based authentication instead of standard password authentication. Key-based authentication uses two keys, one “public” key that anyone is allowed to see, and another “private” key that only the owner is allowed to see. To securely communicate […]