Easy pairing and shell session sharing with tmate

Sdílet
Vložit
  • čas přidán 29. 08. 2024

Komentáře • 12

  • @jcd9821
    @jcd9821 Před 2 lety +1

    Thank you for the video man, i was looking for a way to do that and the Magic of algorithms brings you in.

  • @mosey6615
    @mosey6615 Před 2 lety

    The man has once again uploaded. Nice video!

  • @applesushi
    @applesushi Před 2 lety +5

    I am not sure I want an intermediary between me and my shell session. There is no guarantee that the Tmate servers do not capture your keystrokes and terminal output. They’re almost the definition of a “man in the middle”. I would only use this for things that you don’t mind a third party seeing,
    That said, it looks like you can run your own Tmate servers.

    • @tutoriaLinux
      @tutoriaLinux  Před 2 lety +1

      Yep, that’s true. I believe it basically streams client keystrokes and host-PTY outputs to the tmux session running on the central server. So for anything confidential or sensitive, you’d definitely want to run your own server.

  • @Flankymanga
    @Flankymanga Před 2 lety

    Great video as allways! Thanks for sharing!

  • @WeiFu
    @WeiFu Před 2 lety

    Great thanks for sharing , it is new to me

  • @szmonszmon
    @szmonszmon Před 2 lety

    Many many years ago I did similar thing on AIX box without any 3-party software.

  • @SkullTraill
    @SkullTraill Před rokem

    I know this isn’t directly regarding the main topic of this video which is tmate, but could someone please tell me how to achieve something like this locally? I mean no network at all, I just want 2 separate terminals to be able to connect to the same session

  • @XSYSturbulence
    @XSYSturbulence Před 2 lety

    Nice tool, excellent video. The static builds seems to get caught by antivirus tools. Possibly a false positive but being a paranoid person in constant recovery my innards always gets a jolt when that happens. Any insight?

    • @tps125
      @tps125 Před 2 lety +1

      Not sure if this explains your experience, but sometimes antivirus will flag tools that are in and of themselves not malware, but are powerful tools that can and are frequently used maliciously. PsExec and PsKill, for instance, get flagged sometimes for this reason.

    • @xorsirenz
      @xorsirenz Před 2 lety

      AV detect malicious software based off of "commonly used code" they see in the wild. this program most likely shares similar traits with malware, due to having the ability to get a shell access without much security (unless done properly)

  • @mathieurollet8318
    @mathieurollet8318 Před 2 lety +1

    Didn’t know about the github.com/.keys thing, that’s pretty handy ! Cool video Dave thank you