Book Image

The Software Developer's Guide to Linux

By : David Cohen, Christian Sturm
5 (2)
Book Image

The Software Developer's Guide to Linux

5 (2)
By: David Cohen, Christian Sturm

Overview of this book

Developers are always looking to raise their game to the next level, yet most are completely lost when it comes to the Linux command line. This book is the bridge that will take you to the next level in your software development career. Most of the skills in the book can be immediately put to work to make you a more efficient developer. It’s written specifically for software engineers, not Linux system administrators, so each chapter will equip you with just enough theory to understand what you’re doing before diving into practical commands that you can use in your day-to-day work as a software developer. As you work through the book, you’ll quickly absorb the basics of how Linux works while you get comfortable moving around the command line. Once you’ve got the core skills, you’ll see how to apply them in different contexts that you’ll come across as a software developer: building and working with Docker images, automating boring build tasks with shell scripts, and troubleshooting issues in production environments. By the end of the book, you’ll be able to use Linux and the command line comfortably and apply your newfound skills in your day-to-day work to save time, troubleshoot issues, and be the command-line wizard that your team turns to.
Table of Contents (20 chapters)
18
Other Books You May Enjoy
19
Index

Conclusion

OpenSSH is a very versatile tool, and we hope that the introduction you received in this chapter has motivated you to experiment and learn more. Just think of everything we’ve covered:

You’ve learned the basics of how public key cryptography works, which is essential to being able to reason about these kinds of tools and their usage. You saw how to create SSH keys and use them for remote shell sessions.

Hopefully, you got some practical experience, too, by following along and setting up key-based logins for a remote host that you work with often. If that remote host happens to be on Amazon Web Services (AWS) or another platform that uses .pem keys, you learned how to convert between key formats (that trick alone is sure to impress your coworkers).

Even if you didn’t run into them yourself, we exposed you to some of the most common SSH errors we see people get stuck on in the wild, and how to track them down with the –v option.

...