Computer Science B.S. @ California State University, Chico.
Security & Software
Highlights
- Pro
Pinned Loading
-
cmkc-keyboard
cmkc-keyboard PublicChico State Mechanical Keyboard Club's Keyboard and Firmware Design
Python 2
-
React-Calculator
React-Calculator PublicReact Project to serve as a basic calculator. Implements 3rd party libraries, and makes use of hooks. Error handling present throughout
JavaScript 1
-
-
LittleLemonDjango
LittleLemonDjango PublicA Full Stack Django Website for a fictitious restaurant. Complete with templates, REST API, and styling.
Python 1
-
A tutorial on how to connect to your...
A tutorial on how to connect to your host via SSH easier and more secure. 1This tutorial will explain how to create and use keys (AKA Public and Private Keys) to connect to a Linux Host. Also, I will explain the steps to use Visual Studio Code with SSH.
23#### What are the benefits of using keys in SSH?
41. :running:Speedy: SSH using keys makes the connection very fast, removing the process of password input on connection to the host machine.
52. :lock:Secure: SSH using keys is much more secure than password inputs; due to the nature of key pairs, authentication cannot be brute-forced from a third party. (:warning: Unless somehow you are leaking the keys to the public.)
-
Custom ZSH Configuration
Custom ZSH Configuration 1# Setting Up A Custom ZSH Configuration
23### Preface
4The following is my current shell configuration. I use zsh and Oh My ZSH as the plugin manager for zsh. Neofetch shows system info.
5
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.