Differences
This shows you the differences between the selected revisions of the page.
2014-10-01 | 2014-10-01 | ||
toc after intro paragraph (martin) | discarding ~~TOC~~ tag (martin) | ||
Line 3: | Line 3: | ||
and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive | and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive | ||
protection against spoofing. | protection against spoofing. | ||
- | |||
- | ~~TOC~~ | ||
===== Authentication in SSH ===== | ===== Authentication in SSH ===== |