enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. cdist - Wikipedia

    en.wikipedia.org/wiki/Cdist

    Like Ansible, cdist uses a "push" model to apply configuration changes: A cdist process on the "host" machine connects to any number of remote nodes via SSH and then performs configuration updates on those nodes. Cdist can configure multiple hosts in parallel to reduce the time spent configuring. [11]

  3. Secure Shell - Wikipedia

    en.wikipedia.org/wiki/Secure_Shell

    For forwarding X from a remote host (possible through multiple intermediate hosts) For browsing the web through an encrypted proxy connection with SSH clients that support the SOCKS protocol . For securely mounting a directory on a remote server as a filesystem on a local computer using SSHFS .

  4. Comparison of open-source configuration management software

    en.wikipedia.org/wiki/Comparison_of_open-source...

    Detailed reports provide a way to identify unmanaged configuration on hosts. Generators enable code or template-based generation of configuration files from a central data repository. CFEngine Lightweight agent system. Manages configuration of a large number of computers using the client–server paradigm or stand-alone.

  5. Comparison of SSH servers - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_SSH_servers

    An SSH server is a software program which uses the Secure Shell protocol to accept connections from remote computers. SFTP / SCP file transfers and remote terminal connections are popular use cases for an SSH server.

  6. Jump server - Wikipedia

    en.wikipedia.org/wiki/Jump_server

    A typical configuration is a hardened Unix (or Unix-like) machine configured with SSH and a local firewall. An administrator connects to a target machine in the DMZ by making an SSH connection from the administrator's personal computer to the jump server and then using SSH forwarding to access the target machine.

  7. Secure copy protocol - Wikipedia

    en.wikipedia.org/wiki/Secure_copy_protocol

    Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol. [1] "SCP" commonly refers to both the Secure Copy Protocol and the program itself. [2]

  8. SSHFS - Wikipedia

    en.wikipedia.org/wiki/SSHFS

    The client interacts with the remote file system via the SSH File Transfer Protocol (SFTP), [4] a network protocol providing file access, file transfer, and file management functionality over any reliable data stream that was designed as an extension of the Secure Shell protocol (SSH) version 2.0.

  9. Name Service Switch - Wikipedia

    en.wikipedia.org/wiki/Name_Service_Switch

    This file lists databases (such as passwd, shadow and group), and one or more sources for obtaining that information. Examples for sources are files for local files, ldap for the Lightweight Directory Access Protocol, nis for the Network Information Service, nisplus for NIS+, dns for the Domain Name System (DNS), and wins for Windows Internet ...