leyrer
Providing IT-Wizardry in exchange for money for over 20 years. Boldly managing systems where angels fear to tread and configuring products without proper documentation. Easily distracted by everything shiny, blinky and new. Lover and collector of old computers, terminals and IT infrastructure.
Sessions
So, you know how to "use" the ssh command line? You enter connection parameters like username, hostname or private key every time you need to connect? You manually log into the jump/bastion host when connecting to your target host? Then come to this session and learn how you can make your life easier and your work more efficient by using custom config files and a tiny little bit of preparation.
You know the impressive visuals from TV series and movies. The hacker opens a black console window, types fast on the keyboard and suddenly has root on the target system, saving the day. But how does this look like in reality? Let me show you how this might be possible.