... | @@ -115,7 +115,7 @@ That will show you your IMSI, among other pieces of information. |
... | @@ -115,7 +115,7 @@ That will show you your IMSI, among other pieces of information. |
|
|
|
|
|
## Tutorials
|
|
## Tutorials
|
|
|
|
|
|
* SECURE SHELL (`ssh`)
|
|
* ***SECURE SHELL (`ssh`)***
|
|
_Note that using the L5's passcode to log in remotely is relatively weak security. See related tutorials for better authentication solutions._
|
|
_Note that using the L5's passcode to log in remotely is relatively weak security. See related tutorials for better authentication solutions._
|
|
|
|
|
|
SECURE SHELL
|
|
SECURE SHELL
|
... | @@ -176,7 +176,7 @@ In the settings panel of the L5, under `Sharing`, you should now see that Remote |
... | @@ -176,7 +176,7 @@ In the settings panel of the L5, under `Sharing`, you should now see that Remote |
|
|
|
|
|
To exit `ssh`, use the command `exit` in the terminal.
|
|
To exit `ssh`, use the command `exit` in the terminal.
|
|
|
|
|
|
* SECURE COPY (`scp`)
|
|
* ***SECURE COPY (`scp`)***
|
|
|
|
|
|
Copying files and folders remotely between devices on your network
|
|
Copying files and folders remotely between devices on your network
|
|
|
|
|
... | @@ -214,7 +214,7 @@ TIP: Although you perform `scp` without logging in to the other device with `ssh |
... | @@ -214,7 +214,7 @@ TIP: Although you perform `scp` without logging in to the other device with `ssh |
|
|
|
|
|
(Related discussion on this topic can be found in the community forum: https://forums.puri.sm/t/tutorial-using-ssh-and-scp/13080)
|
|
(Related discussion on this topic can be found in the community forum: https://forums.puri.sm/t/tutorial-using-ssh-and-scp/13080)
|
|
|
|
|
|
* ***Enhancing Security for Secure Shell (`ssh`)***
|
|
* ***ENHANCING SECURITY FOR SECURE SHELL (`ssh`)***
|
|
|
|
|
|
Relying on the L5's passcode when using `ssh` for remote access provides relatively weak security. See below for more secure options.
|
|
Relying on the L5's passcode when using `ssh` for remote access provides relatively weak security. See below for more secure options.
|
|
|
|
|
... | | ... | |