Connect with us

Servers computers

How to enable SSH on Linux Ubuntu (Easy step by step guide)

Published

on

How to enable SSH on Linux Ubuntu (Easy step by step guide)



Install OpenSSH-server on Ubuntu to enable SSH to remotely connect to your Ubuntu computer
✅ Subscribe to help us grow: https://www.youtube.com/knowledgesharingtech?sub_confirmation=1

My Amazon affiliate link:
Amazon best sellers Computers and Accessories: https://amzn.to/37v1Z7Z

Linux Commands
Ctrl+Alt+T (to Open terminal)
sudo apt update
clear (to clear the screen)
sudo apt install openssh-server
sudo systemctl status ssh
sudo ufw allow ssh
ip a

Windows commands:
ssh user@ipaddress

Advertisement

Follow me on:
My websites:
https://knowledgesharingtech.com/
https://tripleewebdesigns.com
Facebook: https://www.facebook.com/knowledgesharingtech
Twitter: https://twitter.com/KnowledgeShari6

Disclaimer: Use the instructions in this video at your own risk. We are not responsible for any data loss or other damages that may occur .

source

Continue Reading
Advertisement
45 Comments

45 Comments

  1. @SHAILESHYADAV-gv6hu

    October 13, 2024 at 9:23 am

    Very good 👍

  2. @ddubz6356

    October 13, 2024 at 9:23 am

    does not work

  3. @mincoarmin1260

    October 13, 2024 at 9:23 am

    You Sir are a life saver
    Thanks to you I can work on my mariadb server on my main pc
    Thank you

  4. @manideepkumar959

    October 13, 2024 at 9:23 am

    when both windows and ubuntu are installed on my machine it is working, i am able to connect from my windows machine to my ubuntu machine (where ssh server is installed) , but the same url -when i am trying to connect from diff computer to my ubuntu machine it is saying connection timedout

  5. @peterrchimaa

    October 13, 2024 at 9:23 am

    You have no idea the miracle you just did…this problem slowed me down when i was learning Ansible…i tried everything..UFW PORT ENABLING just unlocked everything

  6. @3mre_1233

    October 13, 2024 at 9:23 am

    Good Video, thanks <3

  7. @TylerrTheMasterBaiter

    October 13, 2024 at 9:23 am

    Where did the command prompt came from ?

  8. @ibrarali4592

    October 13, 2024 at 9:23 am

    thank you for sharing

    Knowledge

  9. @DAYSHIVANSH

    October 13, 2024 at 9:23 am

    It is saying port 22 connect timed out

  10. @johnali4117

    October 13, 2024 at 9:23 am

    Does this technique work in NAT? I've noticed that NAT uses different IP address (inet 10.0.2.15/24) while Bridge Adaptor uses 192.168.x.x ip. Also the Ubuntu must be configured to use static IP address. Please comment if this is correct or am I just imagining?

  11. @microsoftskill8191

    October 13, 2024 at 9:23 am

    ❤ thanks i done with your video

  12. @santoshgujar5237

    October 13, 2024 at 9:23 am

    Thank you, Sir, 🙏🌺😇

  13. @rajankumar_37

    October 13, 2024 at 9:23 am

    Best guide, pretty straight forward! quality content. thanks

  14. @EpicVideoTime4You

    October 13, 2024 at 9:23 am

    THANK YOU! Straight to the point <3

  15. @YanaLukomskaya

    October 13, 2024 at 9:23 am

    It was fast and wonderful! Thank you

  16. @YoungSecurity

    October 13, 2024 at 9:23 am

    At 00:46, it says, "All commands are in the description." The video description does not contain any commands.

  17. @shaykren7362

    October 13, 2024 at 9:23 am

    SMAAAAAAAAAAAAAAAAAAAAAAAAAAAASH

  18. @bretthl1

    October 13, 2024 at 9:23 am

    That was perfect.

  19. @NathanielMujesia

    October 13, 2024 at 9:23 am

    thanks

  20. @aerobrain2001

    October 13, 2024 at 9:23 am

    As an enthusiastic but not overly technical dabbler in Linux, I’d always assumed SSH was way beyond me. But thank you for making it look so simple, simple things but put a smile on my face when I logged into my Ubuntu machine from my UnRAID terminal 🙂

    Thank you!

  21. @kicksiva5845

    October 13, 2024 at 9:23 am

    thank you for your guidance. i tried with redhat but its not working for me but ubuntu its working.

  22. @faustoricardo8875

    October 13, 2024 at 9:23 am

    thanks mate you are the best great video!

  23. @user_hinth

    October 13, 2024 at 9:23 am

    Thanks a lot for your tutorial. Praise to the Almighty Allah,It's working properly.

  24. @legendshettygaming6113

    October 13, 2024 at 9:23 am

    What is the password for IP address

  25. @dogbyte7875

    October 13, 2024 at 9:23 am

    Hey Eloy, thanks for the video, it served as a great refresher. I am not as young as I would like to be, and my memory does not seem to function as it used to. I gave you a like and subscribed. Will join next month, as my finances are limited and fixed (social security). Again, much thanks 😉

  26. @pravin3870

    October 13, 2024 at 9:23 am

    which password to put after putting our othrr pc IP is that Laptops password or which???
    plz help

  27. @nmarks

    October 13, 2024 at 9:23 am

    Clear, unfussy instructions which worked first time. Thank you very much. Subscribed. 👍

  28. @pablocarballeira4443

    October 13, 2024 at 9:23 am

    Thank you for the tutorial,but I have a problem, when trying the connection it says "permission denied(publickey)"
    I am using latest ubuntu server for arm in a Pi4

  29. @omartusson

    October 13, 2024 at 9:23 am

    Thank you.

  30. @advocate7643

    October 13, 2024 at 9:23 am

    Hi, do I have to run these two commands after every time I turn on my server?

  31. @Rahyss

    October 13, 2024 at 9:23 am

    Thank you 👍🏿

  32. @Mateo-pu7xg

    October 13, 2024 at 9:23 am

    Thank you

  33. @harsh8135

    October 13, 2024 at 9:23 am

    and how to do the same for windows

  34. @JustinEckert-fn4nu

    October 13, 2024 at 9:23 am

    you need to run "sudo systemctl start ssh, then sudo systemctl enable ssh if the status came back as dead (inactive)

  35. @tobios89p13

    October 13, 2024 at 9:23 am

    What do i do when its inactive(dead)?

  36. @4evrOk4U

    October 13, 2024 at 9:23 am

    thank,s Done

  37. @blither592

    October 13, 2024 at 9:23 am

    Hello eloy, half of this video helped me so much with the commands when it comes to ssh for both linux and windows, but I am having some trouble here. So what is the password that we have to put for our ip address? I'm a bit confused

  38. @impliese9983

    October 13, 2024 at 9:23 am

    thank you

  39. @Okeh189

    October 13, 2024 at 9:23 am

    not working in mac machine

  40. @pranavvats9439

    October 13, 2024 at 9:23 am

    thankyou so very much sir
    this was sooooo sooo sooooooo helpful

  41. @Chris-nq3ri

    October 13, 2024 at 9:23 am

    nice dude thx!!

  42. @Valksforge

    October 13, 2024 at 9:23 am

    So this can be done the other way around “Connect FROM my personal computer Ubuntu terminal TO datacenter SSH Dedicated Server terminal” A full control from my house to the datacenter em I right? Sorry I’m new to this and wanted to learn more 🙏.

  43. @Valksforge

    October 13, 2024 at 9:23 am

    So this can be done the other way around “Connect FROM my personal computer Ubuntu terminal TO datacenter SSH Dedicated Server terminal” A full control from my house to the datacenter em I right? Sorry I’m new to this and wanted to learn more 🙏.

  44. @luciano5026

    October 13, 2024 at 9:23 am

    Thank you

  45. @KnowledgeSharingTech

    October 13, 2024 at 9:23 am

    For more tutorials, subscribe to my channel, it really makes a difference 💗: https://www.youtube.com/knowledgesharingtech?sub_confirmation=1

You must be logged in to post a comment Login

Leave a Reply

Servers computers

New Home Backup Server (Dell T640 with 18 20TB Disks)

Published

on

New Home Backup Server (Dell T640 with 18 20TB Disks)



In this video I create a new backup server from a Dell EMC PowerEdge T640 with 18x 20TB Seagate Exos refurbished drives. Also there’s some more ranting about backups in general. But idk, there are chapters so you can skip to whatever. And it’s not technically a server, in that it doesn’t serve files. It’s really more of a client that takes files from other servers and holds onto them. But I call it a backup server because hardware-wise it’s a server. Anywho, that’s the description. It’s probably not optimal for the YouTube algorithm, but hey, I’m not an influencer even though I have a TikTok account that I don’t use.

Update: https://www.youtube.com/watch?v=Secv5P01k2M&t=5195

00:00 Intro
02:08 The Drives
03:30 The Data & Other Backups
05:40 RAID & Data Loss
10:00 IcyDock ExpressCage
13:23 Fan Noise
18:30 Caddies, Trays, or Sleds.. Whatever
28:27 Booting & Array Creation
33:50 Array Build Status and Drive Stats
36:43 OS SSDs and T640 Internals
58:20 Lengthy Conclusion (Backups Rant.. again)
1:10:20 Outro .

source

Continue Reading

Servers computers

How to Configure iDRAC9 at Initial Setup of Your Dell PowerEdge Server

Published

on

How to Configure iDRAC9 at Initial Setup of Your Dell PowerEdge Server



For more information on the configuration of an iDRAC 9 please visit our knowledge base: http://www.dell.com/support/article/SLN306877

During the initial startup of your new Dell Server, you have to configure the iDRAC to be able to manage your Dell PowerEdge server remotely. In this video you will learn how to configure the iDRAC9 of your Server for the first time.
The iDRAC 9 is configured with a default IP which you can change during the initial setup.
You can access the iDRAC via a dedicated Network Card or the LAN on Motherboard after it is configured.

🔴 For more helpful tutorials, tips and tricks for Dell EMC Products, subscribe to our channel: http://www.youtube.com/DellEnterpriseSupport?sub_confirmation=1

Want to know more about iDRAC, check out this Playlist:

Advertisement

📺 Find our latest Video here:

📖 You can find our Knowledgebase filled with helpful articles here:
https://dell.to/2mgVTVj

💻 Need help? Contact our Support

Community Forums: http://www.dell.com/community
Twitter: http://www.twitter.com/DellCaresPRO
Facebook: https://www.facebook.com/DellEMCSupport/
Other Contact Options: http://www.dell.com/contact .

source

Advertisement
Continue Reading

Servers computers

Now Available in Lenovo ThinkSystem SR645 Rack Servers

Published

on

Now Available in Lenovo ThinkSystem SR645 Rack Servers



Lenovo is excited to deliver AMD EPYC™ processors with AMD 3D V-Cache™ technology in its ThinkSystem SR645 rack servers. These new systems feature expanded L3 cache designed for technical computing workloads—helping customers get new products to market faster than ever before.  

Discover more: https://www.amd.com/en/events/epyc

*See claims information in video endnotes.

***

Advertisement

Subscribe: http://bit.ly/Subscribe_to_AMD
Like us on Facebook: http://bit.ly/AMD_on_Facebook
Follow us on Twitter: http://bit.ly/AMD_On_Twitter
Follow us on Twitch: http://Twitch.tv/AMD
Follow us on LinkedIn: http://bit.ly/AMD_on_Linkedin
Follow us on Instagram: http://bit.ly/AMD_on_Instagram

©2022 Advanced Micro Devices, Inc. AMD, the AMD Arrow Logo, and combinations thereof are trademarks of Advanced Micro Devices, Inc. in the United States and other jurisdictions. Other names are for informational purposes only and may be trademarks of their respective owners. .

source

Continue Reading

Servers computers

Best Public Bedrock SMP Server to Join!

Published

on

Best Public Bedrock SMP Server to Join!



Best Public Bedrock SMP Server to Join!
Come join this Minecraft Valatic SMP on Java or Bedrock on any device! Join this active server with your friends or by yourself for completely free!

Server IP ➤ play.valatic.net
Bedrock PORT ➤ 19132
SMP Store (HUGE SALE) ➤ https://store.valatic.net
Use code BLUEJAY to save on your purchase! Purchase crate-keys, ranks, and more on the Valatic store.
SMP Discord Server ► https://discord.gg/valatic

To join the Public Minecraft Valatic SMP, watch the ENTIRE VIDEO for the server ip and port. Also, leave all your questions in the comments and I’ll do my best to answer!

The Public Minecraft Valatic SMP is just like the Dream smp and Lifesteal smp and you can join on Minecraft java, bedrock, or pocket edition. You can join anytime for completely free with your friends, or make some on the SMP! The server has an active, growing player base, exciting events, awesome server features, professional staff, and the world map is always expanding so you can explore! You can make friends with other players on the server at the spawn, or smp clubhouse too! There is even a server shop to get awesome items that support the Valatic SMP so it can keep the server running! On the Valatic SMP you can travel to many server locations, build cities, explore land, and even start governments or massive server wars! There are even different game modes on the server like Minecraft Lifesteal SMP, Earth SMP, and One Block! The possibilities on the Public Minecraft Valatic SMP are endless so join now and get started!

Advertisement

If you enjoyed the video then subscribe so I can make more just like it!

This server is a 1.18-1.19.2 Minecraft server and nothing else. Consider Subscribing.
#smp #join #public #java #bedrock #valatic .

source

Continue Reading

Servers computers

Computer Security | Types of Computer Security | Cybersecurity Course | Edureka

Published

on

Computer Security | Types of Computer Security | Cybersecurity Course | Edureka



🔵Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN
🔥Edureka CompTIA Security+ Certification Training: https://bit.ly/3nxeVRl
This Edureka video gives an introduction to Computer Security and the types of computer security. Also, it teaches you various ways to secure your computer devices. Topics covered in this video includes:

1. What is Computer security?
2. Goals of Computer security
3. What to secure?- Types of computer security
4. Potential losses due to cyber attacks
5. How to secure?

🔵CyberSecurity Certification Training : https://www.edureka.co/cybersecurity-certification-training

Subscribe to our channel to get video updates. Hit the subscribe button above.

Advertisement

————————————-

About Edureka Cyber Security Training

Cybersecurity is the combination of processes, practices, and technologies designed to protect networks, computers, programs, data and information from attack, damage or unauthorized access.

Edureka’s Cybersecurity Certification Course will help you in learning about the basic concepts of Cybersecurity along with the methodologies that must be practiced ensuring information security of an organization. Starting from the Ground level Security Essentials, this course will lead you through Cryptography, Computer Networks & Security, Application Security, Data & Endpoint Security, idAM (Identity & Access Management), Cloud Security, Cyber-Attacks and various security practices for businesses.

Advertisement

————————————————

Why Learn Cyber Security?

Cybersecurity is the gathering of advances that procedures and practices expected to ensure systems, PCs, projects and information from assault, harm or unapproved get to. In a processing setting, security incorporates both cybersecurity and physical security, it is imperative since cyberattackers can without much of a stretch take and obliterate the profoundly grouped data of governments, defense offices and banks for which the results are huge so it is essential to have an appropriate innovation which an avoid digital wrongdoings.

—————————————————

Advertisement

Objectives of Edureka Cyber Security Course

This course is designed to cover a holistic & a wide variety of foundational topics of the cybersecurity domain which will be helpful to lead freshers as well as IT professional having 1 to 2 years of experience, into the next level of choice such as ethical hacking/ audit & compliance / GRC/ Security Architecture and so on
This course focuses mainly on the basics concepts of Cyber Security
In this course, we are going to deal with Ground level security essentials cryptography, computer networks & security, application security, data & endpoint security, idAM (identity & access management), cloud security, cyber-attacks and various security practices for businesses
This course will be your first step towards learning Cyber Security

————————————–

Who Should go for this Training?

Advertisement

Anyone having the zeal to learn innovative technologies can take up this course. Especially, students and professionals aspiring to make a career in the Cybersecurity technology. However, Cybersecurity Certification Course is best suited for the below mentioned profiles:-
Networking Professionals
Linux Administrators

———————————————–

For more information, Please write back to us at sales@edureka.co or call us at IND: 9606058406 / US: 18338555775 (toll free).

Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka .

source

Advertisement
Continue Reading

Servers computers

The Man Who Revolutionized Computer Science With Math

Published

on

The Man Who Revolutionized Computer Science With Math



Leslie Lamport revolutionized how computers talk to each other. The Turing Award-winning computer scientist pioneered the field of distributed systems, where multiple components on different networks coordinate to achieve a common objective. (Internet searches, cloud computing and artificial intelligence all involve orchestrating legions of powerful computing machines to work together.) In the early 1980s, Lamport also created LaTeX, a document preparation system that provides sophisticated ways to typeset complex formulas and format scientific documents. In 1989, Lamport invented Paxos, a “consensus algorithm” that allows multiple computers to execute complex tasks; without it, modern computing could not exist. He’s also brought more attention to a handful of problems, giving them distinctive names like the bakery algorithm and the Byzantine Generals Problem. Lamport’s work since the 1990s has focused on “formal verification,” the use of mathematical proofs to verify the correctness of software and hardware systems. Notably, he created a “specification language” called TLA+ (for Temporal Logic of Actions), which employs the precise language of mathematics to prevent bugs and avoid design flaws.

Read more at Quanta Magazine: https://www.quantamagazine.org/bringing-mathematical-perfection-to-software-20220516/

– VISIT our Website: https://www.quantamagazine.org
– LIKE us on Facebook: https://www.facebook.com/QuantaNews
– FOLLOW us Twitter: https://twitter.com/QuantaMagazine

Quanta Magazine is an editorially independent publication supported by the Simons Foundation https://www.simonsfoundation.org/

Advertisement

#computerscience #math .

source

Continue Reading

Trending

Copyright © 2024 WordupNews.com