![]() ![]() Navigate to the directory containing your ZIP file. Notice how our Terminal prompt shows the ~/private directory now. We uploaded our backup.zip file to the ~/private directory, so we’ll use the command below. To navigate to the correct folder, we can use the cd command, as shown below. The next step is to navigate to the ZIP file and unzip it. `sudo yum install unzip` Step 3 – Unzip the ZIP File Using Terminal `sudo apt install unzip` CentOS and Fedora If you are managing a server that does not have the unzip package installed, you can use the following command to install it – note that sudo level permissions are required. Kinsta users do not have to worry about installing the unzip package because it is automatically installed on all our site containers. In some Linux distributions, the unzip package is not installed by default. Trying to restore a backup from a ZIP file? □ Unzipping via SSH is your new secret weapon □ Click to Tweet Step 2 – Install the Unzip Package (Optional) If you are not using public key authentication, you will also be prompted for the SSH password after executing the login command.Īfter a successful SSH login, you should see something like this in your Terminal window. With the example login details below, the SSH terminal command would be ssh -p 24910. If you are using another web host or server provider, the SSH details can typically be found in your dashboard as well.Īfter you have found the login details, you can log in with the following SSH command. For Kinsta users, SSH login details along with the full SSH terminal command are provided in the MyKinsta dashboard. Now that we’ve covered the differences between password and public key authentication, let’s move on to the SSH login process. If you are using another server provider, we recommend taking a look at the relevant documentation on how to upload SSH keys to the server. Kinsta users can upload SSH public keys in the MyKinsta dashboard. During the SSH login process, the cryptographic link between the two keys is verified to authenticate the user. The public key is uploaded to the server, while the private key is stored locally on your computer. The public key authentication method requires you to generate a key pair – public key and private key. Public key authentication is widely regarded as a more secure alternative to password authentication. As such, it’s still important to know how to handle RAR files.Optimize your admin tasks and budget with $275+ enterprise-level features included free in all WordPress plans. The 7-Zip format is one popular option, but it’s far from the standard. That said, we’ve come a long way since the days of ZIP and RAR, and we now have better ways to compress, encrypt, and transfer files. The RAR format was created to address some flaws in the ZIP format and comes with several benefits: smaller file sizes, the ability to split a RAR into multiple chunks, and error recovery. ![]() ![]() RAR stands for Roshal ARchive, named after Eugene Roshal, the Russian software engineer who created the format. That way, you only have to put one file up for download (or attach one file to an email), and receivers only need to download one file, instead of many separate ones. Both are "archive" file formats meant for compressing many individual files into one single file. If you already know this, or if you just don’t care, feel free to skip down to the next section for the actual instructions.Ī RAR file is similar to a ZIP file. ![]()
0 Comments
Leave a Reply. |