ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2015-02-19 2015-02-19
ssh_keys (martin) no summary (martin)
Line 4: Line 4:
protection against spoofing. protection against spoofing.
-The SSH employs a public key cryptography that uses [[ssh_keys|two keys pairs for host and user]].+The SSH employs a public key cryptography that uses [[ssh_keys|two keys pairs, for host and user]].
===== Authentication in SSH ===== ===== Authentication in SSH =====

Last modified: by martin