ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2011-05-25 2011-05-25
no summary (202.84.40.128) (hidden) Restored revision 1292766689. Undoing revision 1306320629. (martin) (hidden)
Line 1: Line 1:
====== Understanding SSH ====== ====== Understanding SSH ======
-qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqSSH is a cryptographically protected remote login protocol that replaces insecure telnet and rlogin protocols. It provides strong protection against password sniffing and third party session monitoring, better protecting your authentication credentials+SSH is a cryptographically protected remote login protocol that replaces insecure telnet and rlogin protocols. It provides strong protection against password sniffing and third party session monitoring, better protecting your authentication credentials
and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive
protection against spoofing. protection against spoofing.

Last modified: by martin