Differences
This shows you the differences between the selected revisions of the page.
| 2014-06-13 | 2014-10-01 | ||
| wp>Man-in-the-middle_attack (martin) | toc after intro paragraph (martin) | ||
| Line 3: | Line 3: | ||
| and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive | and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive | ||
| protection against spoofing. | protection against spoofing. | ||
| + | |||
| + | ~~TOC~~ | ||
| ===== Authentication in SSH ===== | ===== Authentication in SSH ===== | ||