systemd start x11vnc on boot

# apt-get install x11vnc
# x11vnc -storepasswd /etc/vnc.password
# vi /etc/systemd/system/x11vnc.service


[Unit]
Description=Start x11vnc at startup.
After=multi-user.target

[Service]
Type=simple
ExecStart=/usr/bin/x11vnc -display :0 -auth guess -rfbauth /etc/vnc.password -oa /var/log/vnc.log -xkb -forever -bg -noxdamage -repeat -shared
[Install]
WantedBy=multi-user.target



# systemctl enable x11vnc
# systemctl start x11vnc

Limit ssh user to only use rsync

Rsync, ssh with authorized_keys

Let's say you want to backup some data on remote server.
Easiest option is to use rsync.
On the remote server you will need account so you can login and upload the data, but it would be good to limit this account to only touch data in specific dir and nothing more - no shell, no other locations.
Easiest way is to do it with ssh keys.

0. Add the user on the remote server. Do not set password so it can't login.
1. Generate the key:
$> ssh-keygen -t ed25519 -f rsync_key
2. Copy the .pub key to the server you will be syncing to.
3. Create ~/.ssh/authorized_keys on the remote server with the user that will be holding the data.
in the authorized_keys you must place a line with allowed command + limits and the key like so:

command="rsync --server -vlogDtprCze.iLsfxC --delete . /home/john/backup",no-agent-forwarding,no-port-forwarding,no-pty,no-user-rc,no-X11-forwarding ssh-ed25519 AAAA........

4. On the computer that you have private key and the data to backup, you can run the command:
$> rsync -e 'ssh -i rsync_key' -Cavz --delete /home/johncomp/Documents john@hostname:/home/john/backup

That's it.
User john can't execute anything else than the command specified for this key.