Комментарии:
Thank you. With what you have said, I (almost) understand what I need.
ОтветитьThank you for a simple and clear explanation.
ОтветитьExcept it doesn't stay connected. Even when you set it up for regular alerts, ssh drops all the time. It's really annoying when you have to sign back into your venv, it's just a pain.
ОтветитьThanks for the video!
Ответитьthe casual focus fade in/out makes it looks like an office episode and its just priceless/.
Ответитьwidi feugondon...friy gitely.
Y ADYYYYZOOOOOO
Encryption, nah. I prefer to just pipe an interactive shell session out of /dev/tcp. Who needs a TTY anyways...
rshell 🔴 sh
The way you pronounced Tatu Ylönen made me burst a lung laughing
ОтветитьI am using this tunnel, 24/7 in my PC and smartphone for over 3 years now. And I am happy
Ответитьexcellent
ОтветитьMan, you spoke much and fast for a foreign ear))... try to make graphics... thank you.
ОтветитьSteve is a Feynman-tier explainer, great vid.
ОтветитьYou should redo this video. You have only explained that ssh sends packets over a transport system. If you go to the level of packets then tell the reader about public private encryption. Then explain a remote shell. Finally explain how ssh can be used in a non-shell mechanism.
ОтветитьHow many reams of green-bar printer paper do you still have laying around?
ОтветитьAll I want to know where you picked up that lovely, wide, green leporello (endless stationary) paper.
ОтветитьBlimey, he's gangsta in front of a computer.
ОтветитьAm I the only one who finds the marker sound unpleasant?
ОтветитьSo...what's this actually for ...? Like he says connecting to a remote machine...but why ? For what purpose would you ever want to do that? What computer activities are people doing where using SSH vs any of the other ways he mentioned actually matters? I guess I connect to remote machines when I open my internet browser but...it just runs, it's not like I'm actively choosing how it works. I don't understand the underlying reason for any of this.
ОтветитьGot to go fast!
ОтветитьWhere can I buy that shirt?
ОтветитьSo Mathew Broderick didn't have to spend days trying to figure the password for WOPR?
Ответитьssh is probably the most important tool (lower level type like)
ОтветитьScribbling on greenbar... that takes me back.
ОтветитьThis is what makes me mad. SSH is how we did our work. Here comes Sar Banes Oxley auditor who says it is not secure. You have to login in. This is government at its worst. Telling IT workers how to do their job. Next thing I know, Unix and Linux are being pushed out and here comes Microsoft to replace. There is nothing wrong with ssh. The auditors were wrong. Government had no right!!!!
Ответитьthanks
Ответитьcan someone suggest me what to study in order to understand all the concepts related to de video?
ОтветитьNice video
ОтветитьWhat I don’t understand about this and all network encryption generally, is does the first packet have to send the decryption key? How can you send a decryption key without it being sniffed???
ОтветитьTLDR; Google has a cloud that’s protected by an air gap consisting of a turtle shell and bunch of duct tape
ОтветитьYou should use a whiteboard instead of paper.
ОтветитьYour videos are amazing! Thanks you for your work pal!
ОтветитьDidn't understand why you need tcp..since data is flowing via the channels
Ответитьyou people are awesome
ОтветитьThe homely raft cytomorphologically save because kangaroo technologically risk unlike a splendid coin. plain, miscreant banker
Ответитьwat?
ОтветитьThat's a long time ago I saw last time endless paper xD
Ответитьthis video didn't really explain anything. was a waste of time
Ответитьalways have something to set-off the day with ///
ОтветитьDid NSA cracked SSH ?
Ответитьsexy watch tan
ОтветитьFor someone who knows allot about programing, he uses Macs, lol.
ОтветитьWhat if someone sniffs during the time when the server and the client decide on the encryption protocol?
ОтветитьFun video. I have noticed something, when i minimise this video on yt app to bottom bar your shirt looks like static on a tv without signal. Anyone nows why is that?
ОтветитьIf the sniffer intercepts the initial messages that are used to establish the encryption that they will be using then it should be able to decrypt all of the packets correct? Why does this not appear to be a concern?
ОтветитьToast and Jam! I used to be tech lead on that product.
Ответить"other than tcp like websockets" - websockets, by definition, are on top of tcp - so using websockets is effectively using tcp ...
ОтветитьThis was really helpful for me to better understand how it works and why we use it thanks.
Ответитьhaha he said scp
Ответить