Communities

Writing
Writing
Codidact Meta
Codidact Meta
The Great Outdoors
The Great Outdoors
Photography & Video
Photography & Video
Scientific Speculation
Scientific Speculation
Cooking
Cooking
Electrical Engineering
Electrical Engineering
Judaism
Judaism
Languages & Linguistics
Languages & Linguistics
Software Development
Software Development
Mathematics
Mathematics
Christianity
Christianity
Code Golf
Code Golf
Music
Music
Physics
Physics
Linux Systems
Linux Systems
Power Users
Power Users
Tabletop RPGs
Tabletop RPGs
Community Proposals
Community Proposals
tag:snake search within a tag
answers:0 unanswered questions
user:xxxx search by author id
score:0.5 posts with 0.5+ score
"snake oil" exact phrase
votes:4 posts with 4+ votes
created:<1w created < 1 week ago
post_type:xxxx type of post
Search help
Notifications
Mark all as read See all your notifications »
Q&A

Welcome to the Power Users community on Codidact!

Power Users is a Q&A site for questions about the usage of computer software and hardware. We are still a small site and would like to grow, so please consider joining our community. We are looking forward to your questions and answers; they are the building blocks of a repository of knowledge we are building together.

Post History

71%
+3 −0
Q&A How can I ssh to a remote server from my Chromebook?

The Secure Shell extension is perfectly appropriate here. SSH keys come in two parts: a private key and a public key. The public key is placed on the destination server(s), in (for example) ~/.ssh...

posted 2y ago by dsr‭

Answer
#1: Initial revision by user avatar dsr‭ · 2021-12-22T13:18:48Z (over 2 years ago)
The Secure Shell extension is perfectly appropriate here.

SSH keys come in two parts: a private key and a public key. The public key is placed on the destination server(s), in (for example) `~/.ssh/authorized_keys`.

The important thing about a private key is that it remains private to you. You can transfer it just as you would any other file, but you will want to delete any copies in insecure places -- so if you generate a key pair on a machine and copy it to a USB stick, you need to watch that USB stick carefully until it is destroyed. It is therefore easier on many systems to generate the key pair on the system which will use the private key -- but it is not necessary.