Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

These setups are intensely personal though and very limited applicability to anyone else.

And this particular example is dangerous and full of footguns. Cp, rm dangerous by default.

SSH can be just `ssh c` or `ssh chuckbox` with a proper ssh config.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: