How to Tunnel a MySQL Connection Through SSH

In a previous post, we highlighted some of the benefits of tunneling with SSH. Now, you will learn how to use an SSH tunnel to connect to MySQL remotely. With this method, you will connect to SSH, forwarding all information on port 3306 (the MySQL port) through this encrypted connection.
To get started, connect via SSH: […]

The Benefits of SSH Tunneling

SSH tunneling is a method of connection that, as the name implies, tunnels your information stream through SSH. The result is an encrypted and secure transaction, even if the standard connection method itself is not normally secure. Many system administrators may use SSH tunneling for file transfer, database management and many other tasks.
The benefits […]

What Are Shadow Passwords?

On a basic Linux system, passwords are stored in the /etc/passwd file. This is usually OK for a single-user system, but on a multi-user system, such as a server, the passwords should be hidden and encrypted. Shadow passwords allow you to do just that . On Red Hat Enterprise Linux and CentOS, the shadow-utils package […]

A Basic Guide to SSH Server Connections: Part 2

Connecting to an SSH server is usually pretty straightforward, and your login credentials are encrypted for security. This makes SSH useful for other types of connections beyond basic shell access. Backup/syncing tools like rsync can use it, and file transfer programs like SCP for SFTP can use SSH technology for secure file transfers.
In part one, […]

How to Suspend User Accounts on a Linux Server

I hope the time never comes when you have to take action against a user on your dedicated server, but if the situation does arise, you should know how to handle it. With a Linux server, there are several ways to disable an account without completely deleting it. This is useful if you have a […]

5 Server Terms You Should Know

As you embark on the exciting journey that is your dedicated server, you will encounter numerous slogans, terms, phrases, and acronyms. Some are completely relevant and important for you to know.  Others are just thrown in to confuse you. Here are five you should definitely know.
1. Name server – This is the system that will […]

How to Setup an SSH Key

An SSH key is a highly encrypted code that allows you to connect from one server to another, without having to send the password over the network. Because it is encoded, there is less of a chance that hackers will be able to snatch your password and gain unlawful access to your server.
To begin […]