finds you similar websites
auto-suggest    top sites

Apr 26th, 2025

12 Popular Sites Like http://wiki.centos.org/Ho...

We've researched the web and uncovered several striking ssh and security sites like this one. So come and explore more sites that resemble this one.

Displaying 41 to 50 of 500 alternatives to http://wiki.centos.org/HowTos/Netwo.... (Updated: Apr 26th, 2025)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  HowTos/Network/SecuringSSH - CentOS Wiki
Use Public/Private Keys for Authentication. Frequently Asked Question (FAQ) Links ... SSH has made protocols such as telnet redundant due, in most part, to the fact ...
http://wiki.centos.org/HowTos/Network/SecuringSSH
popularity:
ssh
security
centos
linux
howto
sysadmin
bestpractices
configuration
documentation
openssh
new search by a custom tag signature
  Linux Security HOWTO
This document is a general overview of security issues that face the ... It covers general security philosophy and a number of specific examples of how ...
similarity:
popularity:
linux
security
howto
reference
tutorial
sysadmin
unix
guides
server
networking
  Hardening Linux Web Servers
No information avaiable
similarity:
popularity:
linux
security
server
howto
web
apache
php
sysadmin
tutorial
network
  How to circumvent strict firewalls when using public wifi hostpots - verot.net
A tutorial explaining how to bypass firewalls, for instance at the office, in public places or wifi hotspots, using a SOCKS server or tsocks to tunnel everything ...
similarity:
popularity:
ssh
linux
security
proxy
firewall
howto
tunnel
internet
hacking
socks
  Quick Logins with ssh Client Keys
No information avaiable
similarity:
popularity:
ssh
keys
linux
security
sysadmin
login
key
authentication
server
shell
  Kojoney - A honeypot for the SSH Service
No information avaiable
similarity:
popularity:
ssh
security
honeypot
python
sysadmin
linux
tools
software
ids
seguridad
  SSH: Convert OpenSSH to SSH2 and vise versa « //burnz.blog
No information avaiable
similarity:
popularity:
ssh
openssh
key
security
linux
ssh2
sysadmin
conversion
unix
solaris
  SSH Communications Security
Provides cryptography and authentication technologies and products for secure Internet communications. Developer of the SSH protocol.
similarity:
popularity:
ssh
security
software
linux
networking
tools
windows
network
encryption
unix
  Using Rsync and SSH
Please note these instructions may be specific to Red Hat Linux versions 7.3, 9, ... The man pages for 'ssh' and 'rsync' should be helpful to you if you need to ...
similarity:
popularity:
rsync
ssh
backup
linux
howto
tutorial
sysadmin
unix
tools
cron
  SSH Tunnel + SOCKS Proxy Forwarding = Secure Browsing « Ubuntu Blog
When you are at the coffee shop, or at a conference, and you are not sure that ... This happened to me recently and I stumbled across a neat feature of openssh ...
similarity:
popularity:
ssh
proxy
socks
tunnel
linux
security
openssh
firefox
howto
ubuntu
< prev ... 1 2 3 4 5 6 7 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.