Differences
This shows you the differences between the selected revisions of the page.
| 2011-05-25 | 2011-05-25 | ||
| no summary (202.84.40.128) (hidden) | Restored revision 1292766689. Undoing revision 1306320629. (martin) (hidden) | ||
| Line 1: | Line 1: | ||
| ====== Understanding SSH ====== | ====== Understanding SSH ====== | ||
| - | qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqSSH is a cryptographically protected remote login protocol that replaces insecure telnet and rlogin protocols. It provides strong protection against password sniffing and third party session monitoring, better protecting your authentication credentials | + | SSH is a cryptographically protected remote login protocol that replaces insecure telnet and rlogin protocols. It provides strong protection against password sniffing and third party session monitoring, better protecting your authentication credentials |
| and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive | and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive | ||
| protection against spoofing. | protection against spoofing. | ||