There is a very basic tool that everyone uses that works with servers and infrastructure. It is ssh, ssh uses both symmetric and public-key cryptography to keep the data safe in transit. In this article, we are going to talk about the math behind public-key cryptography. Public-key cryptography depends on the prime numbers and large
Tag: ssh
Unable to do ssh into machine.
Unable to do ssh into machine? I have seen this problem many time and i know this is one of the problems that everyone faces. Below are my personal list of things that you can try to solve this problem. Check for key permissions. This happens if you key or pem file does not have
Setting up blog with WordPress and Nginx: Step 1- Setting up aws server and nginx.
This series of blog post will take you through every step to set up a blog. What all we will use to make our Blog with an https domain and SMTP services. AWS or any other server – for hosting Nginx – server Yandex – for free smtp Domain name and DNS mapping. Lets encrypt