Differences
This shows you the differences between the selected revisions of the page.
2015-02-19 | 2015-02-19 | ||
ssh_keys (martin) | no summary (martin) | ||
Line 4: | Line 4: | ||
protection against spoofing. | protection against spoofing. | ||
- | The SSH employs a public key cryptography that uses [[ssh_keys|two keys pairs for host and user]]. | + | The SSH employs a public key cryptography that uses [[ssh_keys|two keys pairs, for host and user]]. |
===== Authentication in SSH ===== | ===== Authentication in SSH ===== |