Summary: We will use Bitlocker to secure device data, requiring a PIN or Password to boot into Windows or read the hard drive. This is aimed to be the definitive guide to getting started and managing BitLocker. Technical Details Bitlocker locks the key for decryption with multiple keys (“Protectors”). This can include TPM, TPM and PIN, Password, a USB key, and even certificates. You can have multiple ways to unlock the decryption key The keys appear transparent to the user, even during recovery The hard drive can be removed and put into another computer.
Summary: SSH Agents hold your SSH keys while you traverse to other SSH targets, without revealing your private keys. Longer Explanation The concept of SSH keys should not be lost on you; if it is, check out my post about SSH keys made easy. However, if your ~/.ssh/authorized_keys file is getting long, and especially if you’re the only user, then you could use an SSH agent to help out.
So today, I was helping someone with a multi-site WordPress issue, and I linked to my blog. But guess what? It wasn’t coming up! All my external tests seemed to work, including Down for Everyone or Just Me, and even Cloudflare! I could still SSH into my server (as I was watching log files scroll by anyways!), so I knew it was up and accessible. So, what’s next?