Welcome to my Technology Hotspot
Featured
TechBytes on Linux
This is a growing list of Linux commands which might come handy for the of Linux users. 1. Found out i had to set the date like this: ...
Monday, July 7, 2025
Friday, July 4, 2025
How to configure passwordless login in Mac OS X and Linux
Overview
This article walks through configuring your website user's SSH connection to your DreamHost server so you will no longer have to enter your password.
Background
Once you set up a shell user and try to log in via SSH, you'll find you must enter your password each time. If you’d like to avoid entering your password every time, you can set up Passwordless Login. This way, you'll be able to automatically log in immediately without needing to enter your password.
How to configure passwordless login
The following instructions configure Passwordless Login for any Unix, Linux, OSX, or Cygwin machine.
In this article, username@server.dreamhost.com is used as the login example.
- Make sure to replace username with your actual shell username.
- Make sure to replace the servername with your DreamHost servername.
Additionally, you can use the default key name of id_ed25519 or create a custom key name. Make sure you use the key name you choose in Step #3 throughout the remaining steps.
See this article for instructions on changing your website user to an SSH (shell user) in your panel. This is required to run the SSH commands in this article.
Creating the .ssh directory on your server (DreamHost server)
This step confirms if the .ssh directory already exists on your DreamHost server, which is needed to copy your local SSH key to your server.
Log into your server via SSH and run the following commands to confirm the ~/.ssh directory exists under your username.
cd ~ ls -la | grep .ssh
- If you see the .ssh directory listed, proceed with the next step.
- If you do not see it, run the following command to create this directory:
mkdir ~/.ssh
Generating the key pair (home computer)
On your home computer:
- Open an SSH terminal.
- Generate an ed25519 private key using ssh-keygen under your username:
ssh-keygen -t ed25519 Generating a public/private ed25519 key pair. Enter the file in which you wish to save they key (i.e., /Users/username/.ssh/id_ed25519):Custom key name
If you press Enter, the key will be created with the default name of id_ed25519.
You can name this anything you like, but if you choose a custom name, you'll need to let your SSH client know about the new key name in Step #6 below. Also, if you choose to use a custom name, make sure to specify the full path to your user's .ssh directory. If you do not, the new key pair is created in the directory you're running the command. For example:
ssh-keygen -t ed25519 Generating a public/private ed25519 key pair. Enter the file in which you wish to save they key (i.e., /Users/username/.ssh/id_ed25519): /Users/username/.ssh/customkey_ed25519
- Proceed through the prompts that appear.
Enter a passphrase (leave empty for no passphrase).
You do not need to enter a passphrase, but it's highly recommended as it protects your private key if compromised. If so, someone would still need your passphrase in order to unlock it. The exception to this is if you're running an automated process such as as cron job. You should then leave the password out. From ssh-copy-id:
- "Generally all keys used for interactive access should have a passphrase. Keys without a passphrase are useful for fully automated processes."
- Press Enter to continue.
Enter same passphrase again:
- Press Enter to continue.
- The following message appears:
Your identification has been saved in /Users/username/.ssh/custom_ed25519 Your public key has been saved in /Users/username/.ssh/custom_ed25519.pub The key fingerprint is: SHA256:7pNvrznUREXWY2r1otEwUWo40aKfZDFsUVDac3YuzrI The key's randomart image is: +--[ED25519 256]--+ | o+*+=| | X..o| | @.= +| | o #.* | | Q o @oB o| | . *.C.+ | | ..S.+ | | .o . .o | | .+..+. | +----[SHA256]-----+
Copying the public key to your DreamHost server (home computer)
- Run the following command to copy the public key on your local computer to DreamHost's server.This command responds with the following:
cat ~/.ssh/id_ed25519.pub | ssh username@server.dreamhost.com "cat >> ~/.ssh/authorized_keys"The authenticity of host 'server.dreamhost.com can't be established. ED25519 key fingerprint is SHA256:dhw3mJELPEz0i5Hzu/9lJR9FiJkK5EtiiPKAw/0zwuU. Are you sure you want to continue connecting (yes/no)? yes
- Confirm the fingerprint in your panel on the SSH Keys page.
- Type out the word yes to continue.
- Enter your ssh username password when prompted.
The commands above create a new file named authorized_keys under your DreamHost user in the ~/.ssh directory.
Update the directory and file permissions (DreamHost server)
You must now update the permissions for the .ssh directory and authorized_keys file to further secure your keys.
Log into your server via SSH and run the following commands:
chmod 700 ~/.ssh chmod 600 ~/.ssh/authorized_keys
Adding your custom key to your ssh client (home computer)
This step is only necessary if you give your key a custom name in Step #3.1 above. You must then let your SSH client know what the new name is using ssh-agent.
- Run the following command to start ssh-agent. Make sure you use the backquote ` character and not a single quote – this backquote character is usually on the top left of your keyboard on the tilde ~ key:
eval `ssh-agent` - Run the following command to add your custom key.
ssh-add ~/.ssh/customkey_ed25519 Identity added: /Users/username/.ssh/customkey_ed25519 - Confirm it's been added by running the following. It will respond with your private key's fingerprint.
ssh-add -l 256 SHA256:7pNvrznUREXWY2r1otEwUWo40aKfZDFsUVDac3YuzrI (ED25519) - Confirm that fingerprint by generating a fingerprint from your custom key's public file.
ssh-keygen -l -f ~/.ssh/customkey_ed25519.pub 256 SHA256:7pNvrznUREXWY2r1otEwUWo40aKfZDFsUVDac3YuzrI (ED25519)
Confirming the SSH connection (DreamHost server)
If everything is configured properly, you should now be able to access your DreamHost account through SSH without a password. Try logging in again.
ssh username@server.dreamhost.com
You should now be able to log in without using a password.
Specifying a key pair for SSH to use
By default, your client will use the identity (private key) named id_ed25519. However, if you've created more than one key, you can specify which one to use when connecting using the -i flag. For example:
ssh -i ~/.ssh/customkey_ed25519 username@server.dreamhost.com
See also
Thursday, May 22, 2025
Google I/O 2025 summary
Google just dropped their biggest Al updates ever during Google I/O 2025.
Here are 13 new Al updates you can't miss:
- Gemini Live. You can now turn on your camera, point at anything, and talk to Gemini about it in real time
- Imagen. Google's best image model yet
- Veo 3. The first video model with native sound generation
- Deep Research
- Project Astra. A JARVIS-like research prototype exploring the capabilities of a universal Al assistant
- Google Flow. Al filmmaking tool for creators
- Agent Mode. A new feature in the Gemini app that lets you state a goal, and Gemini will handle the steps to achieve it
- Google Jules. Jules is an Al-powered coding assistant that can read your code, write tests, fix bugs, and update dependencies
- Al Mode in Search. Al Mode transforms Google Search into a conversational assistant
- Real-time speech translation in Google Meet
- Google Beam. An Al-first video communication platform that turns 2D video streams into realistic 3D experiences
- Gemma 3n. A new open-source Al model optimized for mobile devices
- Try-On. Google's Virtual Try-On feature lets you upload a photo of yourself to see how clothes would look on you
What are your thoughts on this?
Free MCP model context protocol course
Worth investing time on learning the Model context protocol using a free course provided by huggingface.
Wednesday, May 14, 2025
MCP vs RAG (Model Context Protocol vs Retrieval Augmented Generation)
RAG (Retrieval-Augmented Generation) focuses on enhancing AI responses by retrieving external data, while MCP (Model Context Protocol) standardizes how AI interacts with various data sources and tools.
Overview of RAG
2
Functionality: When a user submits a query, RAG retrieves relevant content from connected data sources and appends this information to the input prompt, enriching the model's context with real-world relevance. This helps reduce inaccuracies and hallucinations in AI responses by grounding them in verifiable sources.
2
Use Cases: RAG is particularly useful in scenarios where real-time data is crucial, such as customer support, news aggregation, and any application requiring current information.
3 Sources
Overview of MCP
2
Functionality: MCP allows LLMs to fetch data from multiple sources, such as databases or APIs, without needing to create custom solutions for each interaction. It operates on a client-server model, where the MCP server manages the logic for data retrieval and the MCP client interfaces with the LLM.
2
Use Cases: MCP is designed for applications that require seamless integration of various tools and data sources, making it suitable for complex workflows and environments where multiple data interactions are necessary.
3 Sources
Key Differences
1
Data Retrieval: RAG retrieves external data each time a query is made, whereas MCP allows LLMs to access contextual memory and external data more efficiently, reducing the need for repeated data retrieval.
2
Integration: RAG requires specific setups for each data source, while MCP provides a universal framework that simplifies the integration of multiple data sources and tools into AI applications.
3 Sources
Conclusion
Both RAG and MCP play significant roles in enhancing AI capabilities, but they serve different purposes. RAG is ideal for applications needing real-time data retrieval to improve response accuracy, while MCP offers a standardized approach for integrating various tools and data sources, making it easier to build complex AI systems. Understanding these differences is crucial for developers and organizations looking to leverage AI effectively in their applications.
Popular Posts
-
This is a growing list of Linux commands which might come handy for the of Linux users. 1. Found out i had to set the date like this: ...
-
To set a PDF viewer as the default on Mac OS X: Select any PDF file from Finder. Control-click to open the menu. ... Choose Get...
-
ಮ್ಯಾಕ್ ಬುಕ್ ನಲ್ಲಿ ಕನ್ನಡ ದಲ್ಲಿ ಟೈಪ್ ಮಾಡಲು ಲಿಪಿಕ ಎನ್ನುವ ಈ ಕೆಳಗಿನ ಲಿಂಕ್ ಅನ್ನು ಕ್ಲಿಕ್ ಮಾಡಿ .pkg ಫೈಲ್ ಅನ್ನು ಡೌನ್ ಲೋಡ್ ಮಾಡಿ ಅದನ್ನು ಇನ್ಸ್ತಾಲ್ ಮಾಡಿ...