How to Mount Remote Directories with SSH (+Video Tutorial)

We Keep you Connected

How to Mount Remote Directories with SSH (+Video Tutorial)

How to Mount Remote Directories with SSH (+Video Tutorial)
Your email has been sent
Learn how to easily mount remote directories with the help of a more secure SSH tool. Follow along with Jack Wallen in our step-by-step tutorial.
Do you have remote directories you need to mount on your local desktop so you can work on code, configurations, documentation or just about any kind of file? If those remote files are on a server and you don’t want to share them via the less secure Samba, Secure Shell has you covered.
Thanks to an app called Secure Shell File System (a.k.a. sshfs), you can easily mount remote directories, with the help of the more secure SSH tool. Let me show you how it’s done. I’m going to demonstrate on an Ubuntu-based Linux distribution, so if you use a different OS, you’ll need to modify the installation command.
Once the application is installed, you’re ready to use it.
where USER is your username. You’ll be prompted for the remote user’s password.
from within the parent directory housing MOUNT, and you’ll see a listing of the remote directory contents. Now you can open those files as though they were on your local machine.
And that’s how easy it is to mount a remote directory to your local machine with the help of sshfs. This method is more secure than using a Samba share and is far easier than NFS. Give sshfs a try and see if it makes your workflow easier.
Subscribe to TechRepublic’s How To Make Tech Work on YouTube for all the latest tech advice for business pros from Jack Wallen.
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.
How to Mount Remote Directories with SSH (+Video Tutorial)
Your email has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
This is a comprehensive list of the best AI art generators. Explore the advanced technology that transforms imagination into stunning artworks.
Find the perfect payroll service for your business without breaking the bank. Discover the top cheap payroll services, features, pricing and pros and cons.
Is NordVPN worth it? How much does it cost and is it safe to use? Read our NordVPN review to learn about pricing, features, security, and more.
Free project management software provides flexibility for managing projects without paying a cent. Check out our list of the top free project management tools.
Australian and New Zealand enterprises in the public cloud are facing pressure to optimize cloud strategies due to a growth in usage and expected future demand, including for artificial intelligence use cases.
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.
Welcoming a new employee to the office often requires the installation of a new computer workstation. This TechRepublic Premium guide, and the accompanying checklist, will help you successfully complete the task of creating a new workstation for your business enterprise. From the guide: SOFTWARE After assuring functioning hardware and network connections are installed, the next …
Portable storage media allow employees to access or back up business data both inside and outside the office. However, the ease of use presented by portable storage devices can also place companies at significant risk of lost or stolen data. Moreover, malware can infect portable storage media, which can then be inadvertently or purposely introduced …
No managed services provider should lock itself out of the very network switches or routers it deploys, yet such accidents occur. Network switches have become increasingly complex and sometimes route virtual local area network traffic, while routers power an ever-expanding smorgasbord of filters and services. As a result, it’s easier than ever to skip an …
As financial technology offers advancements and innovations, it also brings along new risks for financial crimes. Recognizing terms and ideas related to financial crime can help businesses enforce safeguards, identify suspicious activities and prevent financial losses caused by tech-related crimes. TechRepublic Premium presents this glossary of terms and concepts to help your understanding. From the …

source

GET THE LATEST UPDATES, OFFERS, INFORMATION & MORE