Category: Uncategorized

shape
shape
shape
shape
shape
shape
shape
shape
Standard

Meeting IT Security Demands!

Unlock the secrets to a secure online presence! In an era where cyber threats are evolving at lightning speed

Standard

SFTP and SCP

Introduction to SFTP (SSH File Transfer Protocol) and SCP (Secure Copy) Introduction In this digital era, it has become highly essential to share files in a safe and effective manner. Two protocols, namely sftp and scp, offer trustworthy and secure file transfer capabilities over a network. Implementing ssh (secure shell) in these protocols ensures that

Standard

Troubleshooting SSH

Troubleshooting SSH : Common issues and how to fix them Introduction Secure Shell (SSH) is a network protocol that allows us to secure remote access to servers. A network protocol called Secure Shell (SSH) is used to connect and interact securely with distant servers or computers and creates a secure channel over an unsecured network.

Standard

SSH Bastion Host

SSH Bastion Host In recent times, there is an increasing need for organizations to give employees access to their IT facilities due to the ongoing Covid restrictions ( such as work from home ) in place and in other cases grant access to external parties like clients, vendors who want to troubleshoot and fix issues

Standard

How to Record Linux Terminal/SSH Sessions?

How to record Linux Terminal/SSH Sessions? What’s SSH session recording / Record SSH Session? SSH session recording is the process of capturing and storing interactions that occur during Secure Shell (SSH) sessions on servers. This includes recording of both commands entered by users and the corresponding outputs. The importance of  Recording SSH Sessions in an

Standard

Tutorial on SSH Agent

What is an SSH Agent? The SSH agent is a key manager for SSH service, which allow us to authenticate remote Linux system interactively. It stores the user’s SSH key and passphrases in process memory. It is one type of single sign-on (SSO). It uses stored SSH keys and passphrases to authenticate to the remote

Standard

RDP session recording

RDP Session Recording You can record rdp session performed via the browser tab. Recording rdp session for your staff or employees accessing your windows servers via rdp is mandatory to meet various security compliances such as pci dss, hippa, FFIEC, SOX, SOC, NIST, NERC, ISO 27001, GDPR and more. A responsible company would record all

Standard

SSH Jump Host with Yubikey ssh two factor authentication

SSH Jump Host with Yubikey Authentication SSH Yubikey based two factor  authentication is integrated into Ezeelogin ssh jump host for extra security. Even if someone steals your username and password (which is on the increase) they cannot access your jump host without your physical key. The YubiKey generates an encrypted password that can only be

Standard

Parallel Shell

Parallel shell – Run commands on multiple Linux servers or Cloud instances simultaneously If you are in charge of large server farms, cluster of Linux nodes for high performance computing, or cryptocurrency mining farms then parallel shell would easily let you manage multiple Linux servers or Cloud instances easily and quickly. Parallel shell is built into

Standard

SSH Two Factor Authentication

SSH jump server with Duo two factor authentication SSH JumpHost and SSH Gateway Ezeelogin supports DUO Security two factor authentication ( 2FA ) which means that anyone having a smartphone these days can easily use it for the second layer of authentication. With DUO, you dont have to type in complex strings or numbers, just