Confirmed users
1,031
edits
No edit summary  | 
				|||
| Line 165: | Line 165: | ||
If you are going to be hacking on the front end, here are some hints for you.  First you want to set up keys on your device so that you do not have to type a password when ssh'ing into the device:  | If you are going to be hacking on the front end, here are some hints for you.  First you want to set up keys on your device so that you do not have to type a password when ssh'ing into the device:  | ||
<pre>  | |||
1. on the device, cd ~  | 1. on the device, cd ~  | ||
2. mkdir .ssh  | 2. mkdir .ssh  | ||
3. copy your public key to ~/.ssh/authorized_keys  | 3. copy your public key to ~/.ssh/authorized_keys  | ||
</pre>  | |||
Now you should be able to ssh from your main machine into your device.  | Now you should be able to ssh from your main machine into your device.  | ||