In this episode of Taming the Terminal, Bart winds up our series within a series all about the Terminal command TMUX. In this final piece he teaches us first how to string commands together to create the TMUX sessions we want with the screens
This week's episode of Chit Chat Across the Pond was another installment of Taming the Terminal. Two weeks ago Bart taught us the basics of a technology called `tmux`, or terminal multiplexer that allows you to access the same server in many d
When Bart first started the Taming the Terminal series in October of 2015, he purposely declared every installment to be "of n" where n was not defined. It's been 3 years since there was an episode of Taming the Terminal, but today we've got a
In 2017 on Taming the Terminal installment 37 of n, Bart taught us about SSH agents and the advantages of using a passphrase to further protect your SSH keys. In the intervening four years, things have changed a bit in macOS, so we decided to d
As promised, Taming the Terminal isn't over yet! Bart Busschots joins us to talk about SSH Agents. We'll talk about how Apple changed things in El Capitan so that you'll have to log into your server with your passphrase more often, and how Ba
It’s been a long time since we did a Taming the Terminal episode but we’re back with episode 36 of n, screen and cron. You’ll hear me say this is episode 35, but with all these numbers flying around we got mixed up!In any case, in this install
In this installment we look at three terminal commands for interacting with the world wide web from the terminal. We'll look at a command-line based browser, and commands for downloading files and viewing HTTP headers.
In this installment we learn how to use SSH config files to automate some aspects of SSH, creating what amount to bookmarks to servers we connect to often. We'll also look at some GUIs for storing SSH connection details.
In this installment we'll look at how SSH tunnels can be used to secure all kinds of network traffic, not just remote commands and file transfers. Most people won't need the power of SSH tunnels very often, if at all, but when you do need them,
SSH can do a lot more than just run commands, and in this installment we'll discover how to use SSH to securely transfer files from one computer to another.
By default SSH uses usernames and passwords to authenticate users, but in this installment we'll discover how to use SSH keys to make SSH both more secure and more convenient.
In this installment we introduce the Secure Shell, or SSH. SSH can do many things, but first and foremost it lets us run command, or entire command shells on remote computers securely
In this installment we put everything we have learned so far about networking together, and describe a workflow for diagnosing home networking problems.
This is the second part of a two-part installment looking at the Domain Name System, or DNS. DNS is a critical cog in the internet's wheel because it translates between human-friendly domain names, and computer-friendly IP addresses.
This is the first part of a two-part installment looking at the Domain Name System, or DNS. DNS is a critical cog in the internet's wheel because it translates between human-friendly domain names, and computer-friendly IP addresses.
In this installment we learn about the Dynamic Host Configuration Protocol, or DHCP. This is the protocol that allows our computers to automatically discover their network settings, and without it portable computing devices simply wouldn't work
This is the second part of a two-part installment exploring the second layer in the TCP/IP stack, the Internet Layer, and most importantly, the IP protocol. In particular we focus on the vitally important, but often confusing, concept of IP sub
This is the first part of a two-part installment exploring the second layer in the TCP/IP stack, the Internet Layer, and most importantly, the IP protocol. In particular we focus on the vitally important, but often confusing, concept of IP subn
In this installment we start at the bottom of the TCP/IP stack, looking at the so-called link-layer, and in particular at Ethernet and the ARP protocol.
This is the second part of a two-part installment describing the TCP/IP networking stack that allows our computers to talk to each other within our homes and offices, and to other computers and server around the world through the internet.
This is the first part of a two-part installment describing the TCP/IP networking stack that allows our computers to talk to each other within our homes and offices, and to other computers and server around the world through the internet.
In this installment we learn how to use the results of a file search as the input to another command. This allows us to do things like set the file permissions on every file that ends in .php.