Web Admin 101: Difference between revisions
Jump to navigation
Jump to search
(Created page with "*101 Things you don't want your web admin to say - [http://www.unixgirl.com/humor/unix/100.things.sysadmin.says.html]") |
(→Links) |
||
(7 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
=Curriculum Development Document= | |||
<html><iframe src="https://docs.google.com/presentation/d/14SW4TQyPYMy5nyXazJOCYohD2hSjL64133k4Di3iQEQ/embed?start=false&loop=false&delayms=3000" frameborder="0" width="960" height="569" allowfullscreen="true" mozallowfullscreen="true" webkitallowfullscreen="true"></iframe></html> | |||
[https://docs.google.com/presentation/d/14SW4TQyPYMy5nyXazJOCYohD2hSjL64133k4Di3iQEQ/edit#slide=id.g1c3fad5424_0_276 edit] | |||
=Introduction= | |||
To be an effective web admin in Linux, you only have to: | |||
*know how to log in | |||
*move files around | |||
*Understand basics of security and backup | |||
Because everything is treated like a file in a computer system. | |||
=Logging In= | |||
*Use ssh | |||
*Using a key is more secure, and allows you to log in without using a password. See how to create a key - [https://docs.google.com/presentation/d/18f9y4sabSZ0-NRdG085SskTJpwJZklghLPxp6sSaAYg/edit#slide=id.g1c150003d9_0_1] | |||
*For example, when you set up an automated process, you want to use your key, not password? | |||
=Links= | |||
*[[Linux Admin 101]] | |||
*101 Things you don't want your web admin to say - [http://www.unixgirl.com/humor/unix/100.things.sysadmin.says.html] | *101 Things you don't want your web admin to say - [http://www.unixgirl.com/humor/unix/100.things.sysadmin.says.html] | ||
*Sysadmin 101 - [http://ops-school.readthedocs.org/en/latest/sysadmin_101.html] | |||
*Unix 101 - [http://ops-school.readthedocs.org/en/latest/unix_101.html] | |||
[[Category:101 101s]] |
Latest revision as of 12:23, 27 June 2017
Curriculum Development Document
Introduction
To be an effective web admin in Linux, you only have to:
- know how to log in
- move files around
- Understand basics of security and backup
Because everything is treated like a file in a computer system.
Logging In
- Use ssh
- Using a key is more secure, and allows you to log in without using a password. See how to create a key - [1]
- For example, when you set up an automated process, you want to use your key, not password?
Links
- Linux Admin 101
- 101 Things you don't want your web admin to say - [2]
- Sysadmin 101 - [3]
- Unix 101 - [4]