Differences
This shows you the differences between the selected revisions of the page.
| 2007-10-03 | 2007-10-03 | ||
| no summary (200.179.161.130) (hidden) | old revision restored (martin) (hidden) | ||
| Line 36: | Line 36: | ||
| [[administration|System administrator can restrict]] connection to server without having their host keys accepted in advance. | [[administration|System administrator can restrict]] connection to server without having their host keys accepted in advance. | ||
| - | ===== === Level 2 Headline === | ||
| - | ====== ====== Level 1 Headline ====== | ||
| - | ====== ''Level 1 Headline''====== ===== Level 1 Headline ===== | ||
| - | [[[[Internal Link]][[[[Internal Link]][[ * http://www.example.com|External Link | ||
| - | - ====== Ordered List Item ====== | ||
| - | __//Underlined Text//**Bold Text**__ | ||
| - | ]]]]]] ====== | ||
| - | ====== | ||
| - | ====== | ||
| - | ===== | ||
| ===== Encryption in SSH ===== | ===== Encryption in SSH ===== | ||
| SSH clients and servers can use a number of encryption methods. In the older SSH-1 protocol, 3DES and DES are typically used. | SSH clients and servers can use a number of encryption methods. In the older SSH-1 protocol, 3DES and DES are typically used. | ||