Tagged articles
28 articles
Page 1 of 1
Xiao Liu Lab
Xiao Liu Lab
Dec 18, 2025 · Operations

scp vs rsync: Choose the Right Tool for Fast, Efficient File Transfers

This guide explains the fundamental differences between scp and rsync, outlines their mechanisms, advantages, and drawbacks, provides practical command examples for various scenarios, highlights common pitfalls, and offers a concise comparison table to help operations engineers select the appropriate tool for secure and efficient file transfers.

LinuxOperationsSysadmin
0 likes · 10 min read
scp vs rsync: Choose the Right Tool for Fast, Efficient File Transfers
Liangxu Linux
Liangxu Linux
Jan 21, 2025 · Operations

Automate SSH Logins with sshpass: Install, Options, and Secure Usage

This guide explains how to install sshpass on Linux, details its command‑line options, and provides practical examples for automating SSH, SCP, and rsync operations while highlighting security considerations and safer alternatives for production environments.

automationrsyncscp
0 likes · 6 min read
Automate SSH Logins with sshpass: Install, Options, and Secure Usage
Raymond Ops
Raymond Ops
Jan 7, 2025 · Information Security

Mastering SSH: Asymmetric Encryption, Authentication, and Configuration Explained

This comprehensive guide explores the fundamentals of asymmetric encryption, delves into SSH’s architecture—including host verification, user authentication, and key management—provides detailed walkthroughs of configuration files, command usage, SCP transfers, automation scripts, and performance optimization techniques for secure and efficient remote access.

ConfigurationPublic Key AuthenticationSSH
0 likes · 47 min read
Mastering SSH: Asymmetric Encryption, Authentication, and Configuration Explained
MaGe Linux Operations
MaGe Linux Operations
Nov 10, 2024 · Operations

How to Set Up rsyslog and SSH Key Authentication on CentOS 8

This guide walks through checking system information, configuring rsyslog on a CentOS 8 client‑server pair, managing syslog/klogd processes, disabling firewalld, and establishing password‑less SSH access using RSA key pairs, while also summarizing useful scp options.

Sysadminkey authenticationrsyslog
0 likes · 15 min read
How to Set Up rsyslog and SSH Key Authentication on CentOS 8
MaGe Linux Operations
MaGe Linux Operations
Apr 4, 2024 · Information Security

Master SSH: Asymmetric Encryption, Key Management, and Advanced Usage Explained

This comprehensive guide covers the fundamentals of asymmetric encryption, detailed SSH architecture, host and user authentication processes, configuration file nuances, command syntax, secure key distribution scripts, and performance tuning tips, providing practical examples and code snippets for secure remote operations.

Public Key AuthenticationSSHasymmetric encryption
0 likes · 46 min read
Master SSH: Asymmetric Encryption, Key Management, and Advanced Usage Explained
Liangxu Linux
Liangxu Linux
May 27, 2023 · Information Security

10 Essential Methods to Secure SSH Connections on Linux

This guide presents ten practical techniques for establishing secure SSH connections on Linux, covering password authentication, key‑based login, tunnels, SCP/SFTP file transfers, SSH agent, keychain, SOCKS proxy, remote desktop, and port forwarding, each with command examples and usage notes.

LinuxSFTPSSH
0 likes · 5 min read
10 Essential Methods to Secure SSH Connections on Linux
Aikesheng Open Source Community
Aikesheng Open Source Community
Apr 14, 2022 · Operations

Performance Comparison of Linux File Transfer Tools (scp, ftp, sftp, rsync, tftp, nc, Python SimpleHTTPServer)

This article presents a systematic performance comparison of several Linux file‑transfer utilities—including scp, ftp, sftp, rsync, tftp, nc, and a Python SimpleHTTPServer—by measuring transfer times for a 50 GB single file and 51 GB spread across 51 200 one‑megabyte files, and discusses each tool’s speed, compression, encryption, and typical use cases.

LinuxPerformance Testingfile transfer
0 likes · 17 min read
Performance Comparison of Linux File Transfer Tools (scp, ftp, sftp, rsync, tftp, nc, Python SimpleHTTPServer)
Open Source Tech Hub
Open Source Tech Hub
Jan 17, 2021 · Fundamentals

Master Secure Copy (scp): Syntax, Options, and Real-World Examples

This guide explains how the scp command works as a secure copy tool built on SSH, covering its basic syntax, three main copy scenarios, essential options for encryption, compression, bandwidth control, and practical examples for transferring files and directories between local and remote hosts.

linux commandnetwork securityscp
0 likes · 8 min read
Master Secure Copy (scp): Syntax, Options, and Real-World Examples
MaGe Linux Operations
MaGe Linux Operations
Jan 16, 2021 · Operations

Master Secure File Transfers with scp: A Step‑by‑Step Guide

Learn how to securely copy files between local and remote machines using the scp command, covering basic syntax, authentication options, copying to and from remote hosts, recursive directory transfers, and transferring between two remote servers, all illustrated with practical examples.

LinuxOperationsSSH
0 likes · 5 min read
Master Secure File Transfers with scp: A Step‑by‑Step Guide
Liangxu Linux
Liangxu Linux
Jul 28, 2020 · Fundamentals

Edit Remote Files Directly from Vim with netrw

This guide shows how to use Vim's built‑in netrw plugin to open, edit, and save files on remote Linux systems via scp, ftp, or other protocols, including command‑line examples, handling custom SSH ports, and using Nread/Nwrite within a Vim session.

Remote Editingnetrwscp
0 likes · 6 min read
Edit Remote Files Directly from Vim with netrw
ITPUB
ITPUB
Apr 21, 2020 · Operations

How to Exclude Files and Directories When Copying with cp, scp, and rsync

This guide shows Linux administrators how to copy files while excluding specific files or directories using three common utilities—cp, scp, and rsync—by demonstrating practical command‑line examples and the necessary syntax for selective transfers.

Linuxcpexclude
0 likes · 6 min read
How to Exclude Files and Directories When Copying with cp, scp, and rsync
Liangxu Linux
Liangxu Linux
Jan 26, 2020 · Fundamentals

Master Essential Linux Commands: wget, scp, ssh-keygen, chmod, tar

This tutorial introduces six indispensable Linux command‑line tools—wget, scp, ssh‑keygen, chmod, tar, and alias—explaining their purpose, common options, and practical examples such as downloading files, transferring data securely, managing permissions, creating archives, and simplifying repetitive commands.

chmodcommand-linescp
0 likes · 8 min read
Master Essential Linux Commands: wget, scp, ssh-keygen, chmod, tar
ITPUB
ITPUB
Jan 9, 2020 · Fundamentals

Master Essential Unix Commands: wget, scp, ssh-keygen, chmod, tar & Aliases

This guide walks experienced command‑line users through six essential Unix utilities—wget, scp, ssh-keygen, chmod, tar, and alias—explaining their purpose, key options, and practical examples such as downloading files, secure copying, key generation, permission management, archiving, and command shortcuts.

AliasUnixchmod
0 likes · 8 min read
Master Essential Unix Commands: wget, scp, ssh-keygen, chmod, tar & Aliases
Liangxu Linux
Liangxu Linux
Sep 22, 2019 · Operations

Master SSH Public‑Key Login for Efficient Batch Server Operations

This guide explains the SSH protocol, demonstrates how to generate and use public‑key authentication, and shows practical techniques—including ssh one‑liner commands, scp file aggregation, and nc data transfer—to perform batch operations across multiple Linux servers without password prompts.

Public Key AuthenticationSSHautomation
0 likes · 9 min read
Master SSH Public‑Key Login for Efficient Batch Server Operations
ITPUB
ITPUB
Aug 5, 2019 · Operations

Mastering SSH Public‑Key Login for Batch Server Operations

This guide explains how SSH public‑key authentication works, walks through generating key pairs, shows the connection handshake, and demonstrates practical batch command execution and file collection across multiple Linux servers using ssh, scp, and nc.

LinuxOperationsPublic Key Authentication
0 likes · 9 min read
Mastering SSH Public‑Key Login for Batch Server Operations
MaGe Linux Operations
MaGe Linux Operations
Jun 23, 2014 · Information Security

Essential Linux Server Hardening: Disable Root SSH, Change Port, and More

This guide outlines practical Linux server hardening steps—including disabling root SSH login, changing the default SSH port, using SCP over FTP, installing denyhosts, managing file permissions, employing dedicated service accounts, and safely obtaining tools like PuTTY—to significantly improve system security.

DenyHostsLinuxPutty
0 likes · 5 min read
Essential Linux Server Hardening: Disable Root SSH, Change Port, and More