Differences
This shows you the differences between the selected revisions of the page.
| 2014-06-13 | 2014-06-13 | ||
| verifying the host key section moved to ssh_verifying_the_host_key (martin) | wp>Man-in-the-middle_attack (martin) | ||
| Line 15: | Line 15: | ||
| ===== Verifying the Host Key ===== | ===== Verifying the Host Key ===== | ||
| - | To prevent man-in-the-middle attacks, each SSH server has a unique identifying code, called a host key. These keys prevent a server from forging another server's key. If you connect to a server for the first time or if the server presets a different key then previously, WinSCP will prompt you to [[ssh_verifying_the_host_key|verify the key]]. | + | To prevent [[wp>Man-in-the-middle_attack|man-in-the-middle attacks]], each SSH server has a unique identifying code, called a host key. These keys prevent a server from forging another server's key. If you connect to a server for the first time or if the server presets a different key then previously, WinSCP will prompt you to [[ssh_verifying_the_host_key|verify the key]]. |
| ===== Encryption in SSH ===== | ===== Encryption in SSH ===== | ||