Комментарии:
nice explanation man...👌👌👌👌
ОтветитьVery useful. Thank you!
ОтветитьThis guy simplified the encryption idea so briliantly
Ответитьis SSH and PKI the same?
ОтветитьGreat explanation. Thanks.
ОтветитьHello. Many thanks for the useful information.
I 'd like to know how to use SSH2 in a shared web hosting.
neat
ОтветитьThanks you, this was very helpful.
ОтветитьThank you for the intro.
ОтветитьOne detail-oriented observation: is SSH a protocol, still, or a command-line tool/program? because, it's said to be the replacement for Telnet (which is defined as an Application Layer Protocol), in which case - yea, protocol swaps another protocol; however, rsh or rlogin are NOT defined as protocols.. they're rather console applications. So, there is a bit of mist in terms of modelling responsibility layer(s). Is SSH a protocol? or a tool? or if both - that's even worse - then when one is a protocol and when one is a tool? protocol, at the end of the day, cannot be a replacement for a tool, and vice versa.
ОтветитьThanks. Very informative.
ОтветитьSo the data has to travel back and forth always?
ОтветитьAmazing explanation. Thank you!
ОтветитьThank you!
ОтветитьThat was awesome
ОтветитьVery well explained !
ОтветитьNice
ОтветитьWell done.
ОтветитьHello! Thank you for this video! I understood immediately the idea with the image of locks and keys, it helps me a lot!
ОтветитьGreat explanation thank you!
ОтветитьExcellent explanation and very helpful for a newbie such as myself! :)
ОтветитьExcellent crystal clear explanation! Thanks
Ответить