How SSH With a Private Key Works

How SSH With a Private Key Works

GENIConference

9 лет назад

52,265 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

aEr0
aEr0 - 07.09.2023 04:25

Can barely hear anything :(

Ответить
Jeddia Jones
Jeddia Jones - 04.08.2022 14:50

Can't hear you!

Ответить
Chavdar Angelov
Chavdar Angelov - 27.04.2022 13:42

Nice explanation. You have a calming voice!

Ответить
Cane_kendric_official
Cane_kendric_official - 23.12.2020 02:08

Try yardtools on instagram, he's the best to get your work done.

Ответить
Andy Grace
Andy Grace - 08.12.2020 03:44

I recommend erictoolls on instagram or whatsapp *16572076574 to you all to help you out cause he finds solution to every of my problems.

Ответить
madyara Nurahlaida
madyara Nurahlaida - 06.11.2020 07:37

hiddentoolz on lg.. best ever on prvt keys, thanks to those who recommended them❤️🙌

Ответить
Hammed Jamiu
Hammed Jamiu - 26.03.2020 06:28

1805codes give the real 🔑 key 🔐 he on iG

Ответить
Ajith Kumar
Ajith Kumar - 09.01.2020 08:34

volume is very low

Ответить
ConeSilly Valley
ConeSilly Valley - 13.11.2019 12:05

NSF should get my money back from this video uploader

Ответить
Sam AdvanES
Sam AdvanES - 16.03.2019 22:12

Are you talking or crying? I need a 200W audio power amplifier! ;'D. Anyway, nice video. Next time try to improve on the recorded audio level. thanks

Ответить
Syzygy
Syzygy - 14.02.2019 20:21

Download Audacity. Download Lame for Audacity. Put in your audiotrack. Click amplify. Click ok. You're done

Ответить
KP Ad
KP Ad - 20.02.2018 21:50

Good video and to the point. Audio was a bit low but I could live with that.

Ответить
L OS
L OS - 13.02.2018 10:28

Q: gerrit for example , we now understood that public's stored in server , private key within client PC, as your video shows.... the thing is, after client account authentication passed, how normal data transfer be encrypted? Server encrypt data with public key, send these data to client , and then these data're decrypted by client with private key. but what about data direction from client to server ? who takes charge to encrypted ? thx

Ответить
Z Zyz
Z Zyz - 11.02.2018 17:46

Speak out woman!

Ответить
Bruno Filgueiras
Bruno Filgueiras - 16.11.2017 14:08

Very helpful, audio could've been better!

Ответить
debianmaster
debianmaster - 12.10.2017 19:41

great explanation!

Ответить
Gabriel
Gabriel - 20.09.2017 16:26

Try to speak louder

Ответить
This Guy
This Guy - 11.04.2017 14:49

yells WHAT?

Ответить
winnie
winnie - 17.03.2017 01:57

Stupid video, I wanted to know how it works, bit not how to use it!

how does remot server know which one key to use? Both local server and remote one can have thousands keys installed!

Ответить
Learning Tech
Learning Tech - 29.01.2017 01:14

Voice is very low, I tried to listen twice but could not hear it. Maybe I will try with external speakers.

Ответить
林楷崴
林楷崴 - 23.11.2016 11:45

The video makes me tune up the volume twice.

Ответить
Stephen Chandler
Stephen Chandler - 09.11.2016 17:03

Thank you for the video.  One constructive criticism... You mention having one key to log onto many servers.  This is incredibly un-secure.  This would mean that if your key was stolen or compromised then you have also made vulnerable all of your servers.  It is much safer to have separate key pairs for each server.

Ответить
William Heckman
William Heckman - 22.09.2016 16:17

Audio sucks.

Ответить
Brian Schermerhorn
Brian Schermerhorn - 02.08.2016 01:03

Not to mention it also makes executing connections to other servers via a script much easier. Great explanation.

Ответить
Andrew Aunelle
Andrew Aunelle - 11.02.2016 19:46

Thanks, this was very helpful!

Ответить
utp mahesh
utp mahesh - 29.12.2015 19:48

Thanks for video! This is explained well.
Cheers!!

Ответить