Differences
This shows you the differences between the selected revisions of the page.
2014-06-13 | 2014-10-01 | ||
wp>Man-in-the-middle_attack (martin) | toc after intro paragraph (martin) | ||
Line 3: | Line 3: | ||
and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive | and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive | ||
protection against spoofing. | protection against spoofing. | ||
+ | |||
+ | ~~TOC~~ | ||
===== Authentication in SSH ===== | ===== Authentication in SSH ===== |