ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2010-12-19 2011-05-25
Restored revision 1273214942. Undoing revision 1292760509. (martin) (hidden) no summary (202.84.40.128) (hidden)
Line 1: Line 1:
====== Understanding SSH ====== ====== Understanding SSH ======
-SSH is a cryptographically protected remote login protocol that replaces insecure telnet and rlogin protocols. It provides strong protection against password sniffing and third party session monitoring, better protecting your authentication credentials+qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqSSH is a cryptographically protected remote login protocol that replaces insecure telnet and rlogin protocols. It provides strong protection against password sniffing and third party session monitoring, better protecting your authentication credentials
and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive
protection against spoofing. protection against spoofing.

Last modified: by 202.84.40.128