Differences
This shows you the differences between the selected revisions of the page.
2014-10-01 | 2015-02-19 | ||
discarding ~~TOC~~ tag (martin) | public_key (martin) | ||
Line 1: | Line 1: | ||
====== Understanding SSH ====== | ====== Understanding SSH ====== | ||
SSH is a cryptographically protected remote login protocol that replaces insecure telnet and rlogin protocols. It provides strong protection against password sniffing and third party session monitoring, better protecting your authentication credentials | SSH is a cryptographically protected remote login protocol that replaces insecure telnet and rlogin protocols. It provides strong protection against password sniffing and third party session monitoring, better protecting your authentication credentials | ||
- | and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as public key authentication and extensive | + | and privacy. In addition, SSH offers additional authentication methods that are considered more secure than passwords, such as [[public_key|public key authentication]] and extensive |
protection against spoofing. | protection against spoofing. | ||