ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2014-10-01 2015-02-19
discarding ~~TOC~~ tag (martin) public_key (martin)
Line 1: Line 1:
====== Understanding SSH ====== ====== Understanding SSH ======
SSH is a cryptographically protected remote login protocol that replaces insecure telnet and rlogin protocols. It provides strong protection against password sniffing and third party session monitoring, better protecting your authentication credentials SSH is a cryptographically protected remote login protocol that replaces insecure telnet and rlogin protocols. It provides strong protection against password sniffing and third party session monitoring, better protecting your authentication credentials
-and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive+and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as [[public_key|public key authentication]] and extensive
protection against spoofing. protection against spoofing.

Last modified: by martin