Differences
This shows you the differences between the selected revisions of the page.
| 2014-10-01 | 2014-10-01 | ||
| toc after intro paragraph (martin) | discarding ~~TOC~~ tag (martin) | ||
| Line 3: | Line 3: | ||
| and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive | and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive | ||
| protection against spoofing. | protection against spoofing. | ||
| - | |||
| - | ~~TOC~~ | ||
| ===== Authentication in SSH ===== | ===== Authentication in SSH ===== | ||