Security
SecurityHow to use WinSCP with public key authentication
Public key authentication with SSH is possible with WinSCP, but it requires some work to set up. Chad Perrin details the steps.
\ I'm an IT consultant, developer, and writer. I hold both MS and CompTIA certs and am a graduate of two IT industry trade schools. I was at one time the datacenter technician for the Wikimedia Foundation, probably the \"coolest\" job I've ever had: major geek points for being the first-ever paid employee of the Wikimedia Foundation. I was sad to give it up, but moving to Colorado kinda makes working in a Florida datacenter difficult. I have also written hundreds of articles for TechRepublic. \ Aside from directly work-related skills, I'm an ethical theorist and industry analyst with a keen eye toward open source technologies and intellectual property law. Both parents have worked in IT/IS about as long as I've lived, and I have an enthusiastic interest in computing even outside my profession. I've been playing with computers off and on since about 1980. I started just in time to see an IBM 7072 in operation. \ I'm an active member of a great many Internet-enabled and meatspace computing enthusiast and professional communities including mailing lists, LUGs, and so on. \ See more at: \ \ Apotheonic Labs \ blogstrapping \ Chad Perrin Dot Com \ Copyfree Initiative \ Singular IT, LLC \ UnivAcc \ \ You can find many of my TR articles in a publication listing at Apotheonic Labs, though changes in TR's CSS have broken formatting in a lot of them. \ \ \ Open Works License | http://owl.apotheon.org \
Public key authentication with SSH is possible with WinSCP, but it requires some work to set up. Chad Perrin details the steps.
Backing up your files is a very important and very often neglected measure to save yourself the frustration of lost data. Overcome that neglectful tendency, and protect your data from accidental loss with a simple rsync script.
In the wake of WikiLeaks troubles and battles over net neutrality, one of the founders of The Pirate Bay proposes a parallel Internet. Do you think we need one?
Is there a browser for users who dislike the monolithic bloat of the most popular Web browsers, but want more than the console-based minimalism of Lynx and W3m?
There are distinct differences between Unix and MS Windows security philosophies. Two design policies serve as apt examples of those differences.
A recent eWeek article suggests the end of open source software is nigh. It probably isn't, but that doesn't mean open source software faces no dangers, either.
As the idea that TSA policies are a joke becomes ever more popular with the American people, one TSA screener decides to prove them right - literally.
Why do people write viruses and other mobile malicious code? The answer isn't as simple as it used to be. Here are some possible motives suggested by security expert Chad Perrin and several TechRepublic members.
Employers aren't the only ones who have to look after security when an employee leaves. If that departing employee is you, make sure you pay attention to threats to your personal privacy and security.
Employment transition is an often overlooked danger to company security. Make sure you have policies and procedures in place that will protect your business from security compromises when someone leaves your company.