Intro to SSH and SSH Keys

  Рет қаралды 134,992

Paul Turner

Paul Turner

Күн бұрын

SSH (Secure Shell) serves as one of the core authentication technologies for privileged access, enabling access to Unix/Linux systems, routers, switches, firewalls, etc. In spite of it's important role in security, many security executives don't have a basic understand of SSH. This short clip provides an introduction.

Пікірлер: 120
@mattjoe67
@mattjoe67 4 жыл бұрын
Thank you very much for simple and extremely easy way explaining SSH, some instructors or professors make things very difficult for their students, those instructors want to feel important and smart by not sharing the simple and easy method with their students, I hope you make more videos thank you, Sir.
@PaulTurnerChannel
@PaulTurnerChannel 4 жыл бұрын
Thank you very much for the feedback. I'm sorry that I didn't respond earlier. I really do appreciate it.
@Thmyris
@Thmyris 4 жыл бұрын
Big ego teachers are indeed super annoying. I'm in love with some of my teachers who have big stats in humility, like this youtuber :)
@user-mi9ng9ez1x
@user-mi9ng9ez1x 7 жыл бұрын
I've searched lot of videos, and this is the first one that explain this topic so well. Very good explanation, it helped me alot. thanks
@ameyapatil1139
@ameyapatil1139 7 жыл бұрын
Absolutely brilliant ! Helped my understand this vague concept in just few minutes
@davidstandish1482
@davidstandish1482 7 жыл бұрын
Thx for posting Paul. Nice primer.
@punjabimitti
@punjabimitti 3 жыл бұрын
Excellent presentation with soothing voice, context, perspective and technical details.
@PaulTurnerChannel
@PaulTurnerChannel 3 жыл бұрын
I’m glad you liked it, Sunil. Thanks for the kind words.
@ibrahimmarin3541
@ibrahimmarin3541 6 жыл бұрын
You make it very easy to understand! Great Job!
@ayasswain
@ayasswain 6 жыл бұрын
Excellent video on SSH. Very nice explanation.
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Thanks a bunch for the feedback, Ayaskant.
@RajanSingh-kr7pg
@RajanSingh-kr7pg 6 жыл бұрын
Thanks for the concept. Very nicely done !!
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Glad it was helpful, Rajan.
@lubeda04
@lubeda04 5 жыл бұрын
Very good introduction to this technology. It helped me a lot.
@PaulTurnerChannel
@PaulTurnerChannel 5 жыл бұрын
Glad it was helpful, Ludger. Thank you for taking the time to provide the feedback.
@abhi_galav
@abhi_galav 5 жыл бұрын
This is certainly the best explanation on this topic
@PaulTurnerChannel
@PaulTurnerChannel 5 жыл бұрын
Thanks a bunch, Abhishek
@Marceau.
@Marceau. 7 жыл бұрын
you should make more videos, they are really well done :)
@the-sunny-side-up
@the-sunny-side-up 3 жыл бұрын
Lively and lucid, as always!! Thanks Paul for making my life so easy :)
@PaulTurnerChannel
@PaulTurnerChannel 3 жыл бұрын
Wow! If I’m making your life easy, I have to go back and watch that video. I need some of that ;-) Seriously, thanks for your generous comment, Arkadeep. It puts a big smile on my face.
@cyberguide_in
@cyberguide_in 2 жыл бұрын
Wow... an extremely insightful video.
@PaulTurnerChannel
@PaulTurnerChannel 2 жыл бұрын
Thank you, One Step Ahead. I’m glad you found it helpful.
@iamsiddhantsahu
@iamsiddhantsahu 5 жыл бұрын
Superb explanation, cleared all my doubts about ssh!
@PaulTurnerChannel
@PaulTurnerChannel 5 жыл бұрын
Wow. Thanks, Siddhant.
@ErsanYolcu
@ErsanYolcu 6 жыл бұрын
Amazing explanation. Thanks a lot for the time you have spent to share all these information.
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Thank you for the feedback, Ersan. I really appreciate it.
@ujjwalghatak3787
@ujjwalghatak3787 5 жыл бұрын
very good, thanks for sharing your knowledge
@PaulTurnerChannel
@PaulTurnerChannel 5 жыл бұрын
Thank you for your comment, Ujjwal. I appreciate it.
@pkelly20091
@pkelly20091 5 жыл бұрын
You have a great ability in explaining things in a simple way which is refreshing
@PaulTurnerChannel
@PaulTurnerChannel 5 жыл бұрын
Thank you very much for the feedback. It means a lot to me. I'm glad you found the videos helpful.
@thedr00
@thedr00 4 жыл бұрын
This was excellent. Thank you for sharing.
@PaulTurnerChannel
@PaulTurnerChannel 4 жыл бұрын
Thanks a bunch for taking the time to send a comment. I really appreciate it. I’m glad it was helpful.
@shivmmehrotra
@shivmmehrotra 4 жыл бұрын
By far best video on ssh keys on youtube
@PaulTurnerChannel
@PaulTurnerChannel 4 жыл бұрын
Wow, Shivam. That is quite a compliment. Thank you very much for taking the time to provide your feedback. I’m glad you liked it.
@KeepItTechie
@KeepItTechie 6 жыл бұрын
Great video Paul. I really enjoyed how you broke SSH down.
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Thanks a bunch for the feedback, KeepItTechie.
@deepakevgoogle
@deepakevgoogle 5 жыл бұрын
Well explained. Thank you.
@PaulTurnerChannel
@PaulTurnerChannel 5 жыл бұрын
Thank you for taking the time to comment, Deepak. I'm glad you liked it.
@inderdhami2001
@inderdhami2001 7 жыл бұрын
Best video on How SSH really works.. thanks!! Is there any video on resolving the plethora of keys or inventory management?
@PaulTurnerChannel
@PaulTurnerChannel 7 жыл бұрын
Thanks for the feedback, Inderpal. I've been remiss in getting that video done. I'll work on getting something uploaded soon. Thanks again.
@sergeiromanoff
@sergeiromanoff 7 жыл бұрын
Great video! The only thing worth mentioning is the relation between the private and public keys. A message encrypted with the private key can be decrypted only with the corresponding public key. And the public key can decrypt only those messages encrypted with the corresponding private one.
@ayasswain
@ayasswain 6 жыл бұрын
You nailed it. I was also thinking about the same. He should have told this in this video. But still its a great video. He has explained the concept quite well.
@dmitryrukavishnikov6711
@dmitryrukavishnikov6711 6 жыл бұрын
Did you mean that private key can decrypt messages encrypted with corresponding public key in your last sentence ?
@brucedmello7670
@brucedmello7670 6 жыл бұрын
Umm no asymmetric cryptography works differently...the private can ONLY decrypt and the public key can ONLY encrypt. The public key cannot decrypt a message it has encrypted (if it could that means anybody with the public key could decrypt a message encrypted by another user with the same public key)
@kalyanhr
@kalyanhr 5 жыл бұрын
very well explained!!
@PaulTurnerChannel
@PaulTurnerChannel 5 жыл бұрын
I’m glad it was helpful, Kalyan. Thanks for the feedback.
@gissc-globalitsecuritysolu2163
@gissc-globalitsecuritysolu2163 6 жыл бұрын
Very good overview..
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Thank you very much for the feedback.
@lesliedrozario5890
@lesliedrozario5890 3 жыл бұрын
Excellent explanation Paul. I am just about stepping into SSH world and your video has given me a great start. Make more videos if possible :P
@PaulTurnerChannel
@PaulTurnerChannel 3 жыл бұрын
The SSH world is awesome. Lots to learn and endless challenges ;-). I’m sure you’ll enjoy it. You might look up the NIST document that Tatu and I co-authored with NIST. You might find it helpful. I’ll do my best to get a couple of videos out this summer. This darn day job keeps me busy, and it’s lots of fun ;-)
@lesliedrozario5890
@lesliedrozario5890 3 жыл бұрын
@@PaulTurnerChannel Indeed, the little that I have picked up from your videos makes me believe it's going to fun working on SSH 😉. BTW... Where can I find the NIST document you mentioned. Please guide if possible 🙏
@PaulTurnerChannel
@PaulTurnerChannel 3 жыл бұрын
nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.7966.pdf For some reason, it was slow to download this morning.
@lesliedrozario5890
@lesliedrozario5890 3 жыл бұрын
@@PaulTurnerChannel Thanks a ton
@wirelessnerd7131
@wirelessnerd7131 3 жыл бұрын
Thanks Paul. Very well explained.
@PaulTurnerChannel
@PaulTurnerChannel 3 жыл бұрын
Thanks for the feedback, Wireless. I’m glad you liked it.
@mdshoaug9019
@mdshoaug9019 2 жыл бұрын
@@PaulTurnerChannel van ons land en
@PaulTurnerChannel
@PaulTurnerChannel 2 жыл бұрын
@@mdshoaug9019 You have me stumped. Is that Dutch?
@IsmailMohammedi4ismail
@IsmailMohammedi4ismail 6 жыл бұрын
great video ! :-)
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Thank you very much, Ismail.
@JohnKatiku
@JohnKatiku 4 жыл бұрын
This is a Good Listen Thank you. Is there an update to this can follow and how to mitigate the risks ..?
@PaulTurnerChannel
@PaulTurnerChannel 4 жыл бұрын
I’m very sorry for the slow response, Katiku. I created two other videos that discussed SSH components, risks, and best practices. The first one is here: kzbin.info/www/bejne/honMXmZvmtGlbLs The second one is the furthest I’ve gotten on providing suggestions for addressing the risks in my videos. It is here: kzbin.info/www/bejne/mqObiGZqncaoqsU If you’d like a copy of the spreadsheet that is used for the metrics, reply to this comment and I’ll see what I can do. Thank you very much for taking the time to reach out.
@piyushkhare3394
@piyushkhare3394 4 жыл бұрын
Please make more videos...Thanks a lot for this video.....
@PaulTurnerChannel
@PaulTurnerChannel 4 жыл бұрын
Thank you for the feedback, Piyush!
@tapsulinka
@tapsulinka 3 жыл бұрын
SSH was developed by Tatu Ylönen. He was my friend at student time 😊😊
@PaulTurnerChannel
@PaulTurnerChannel 3 жыл бұрын
Thank you for sharing that you were in school with Tatu! He clearly has been a leader in a variety of areas of security.
@alexperez85
@alexperez85 6 жыл бұрын
awesome stuff
@alexperez85
@alexperez85 6 жыл бұрын
any part 2?
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Hey, Alex. Sorry for the slow response. The best I have so far for Part 2 are: kzbin.info/www/bejne/gHzVgGiNdqeXpbs kzbin.info/www/bejne/honMXmZvmtGlbLs kzbin.info/www/bejne/mqObiGZqncaoqsU I'm hoping to get some other material done but this darn day job keeps getting in the way :-) Thanks a lot for the feedback!
@shashivardhan6541
@shashivardhan6541 2 жыл бұрын
Thank you sir
@PaulTurnerChannel
@PaulTurnerChannel 2 жыл бұрын
Thank you, Shashi. I appreciate you taking the time to comment!
@Manch271
@Manch271 Жыл бұрын
Thanks.
@juanjosecastro2178
@juanjosecastro2178 6 жыл бұрын
Nice video. I use public/private keys in openvpn software. But i was wondering how it works on cisco or other network devices since the user who logs into it via ssh doesn't have a private key, he or she, only types the username/password.
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Sorry for the very slow response, Juan Jose. The default for SSH is to use a username and password. When a client connects and accepts the server's public key, the client and server are able to establish a secure connection via Diffie-Hellman (a cryptographic algorithm used by SSH to establish a session key between the client and server). The user is then able to enter their username and password and it is transferred safely across the encrypted connection. Most SSH systems provide the option to use SSH public key authentication, where an authorized key is placed on the server, as described in this video. I hope this helps.
@chandrasekharavajpayeemadd2494
@chandrasekharavajpayeemadd2494 Жыл бұрын
are these keys persistent ? What should we do make sure keys are persistent?
@amula5939
@amula5939 6 жыл бұрын
can server2 use its Server keys to communicate with server1 instead of User keys?
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Sorry for the slow response, Amanuel. You can use host-based authentication to authenticate clients (users or automated processes authenticating to another system that is acting as an SSH server). This is not really a recommended method of authentication, as you can't configure command restrictions and there are other limitations. There is a bit more explanation in nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.7966.pdf if you're interested.
@RayAvijeet
@RayAvijeet 4 жыл бұрын
Q. What happens if the public-key received in the very first connect instance is another server’s ? Could the security of the intended server be compromised ? How would an intermediary server be able to hack in then ? Pls explain briefly if possible to make it crystal.
@PaulTurnerChannel
@PaulTurnerChannel 4 жыл бұрын
Thanks for your question, Avijeet. For starters, this attack assumes that the attacker is able to get the user's client to redirect them to their server (rogue-server) instead of the server they intended to connect to (good-server). This would most likely be done by manipulating ARP or DNS (which is not necessarily trivial). With that said, here are the steps: 1. User1 enters "ssh user1@good-server" on their workstation to login to good-server. 2. User1 is redirected to rogue-server (based on the ARP or DNS manipulation above). 3. User1 is prompted by their ssh client to confirm the public key for "good-server" (though it is actually the public key for rogue-server). User1 doesn't double check to ensure that is the correct public key for good-server and responds "yes" to their client. The client stores that as the correct public key for good-server. 4. rogue-server then prompts user1 for their password. User1 enters their password into their ssh client, which is then sent to rogue-server. 5. While user1 is awaiting a response from rogue-server (thinking that it is actually good-server), rogue-server initiates an ssh connection to good-server (e.g., using a command like "ssh user1@good-server"). 6. good-server prompts rogue-server for the password for user1. 7. rogue-server provides the password they received from user1 to good-server. 8. good-server returns a prompt to rogue-server. 9. rogue-server returns the prompt provided by good-server to user1. 10. As user1 starts to enter commands, rogue server passes those commands to good-server and the responses provided by good-server verbatim (so that user1 doesn't know that rogue-server is actually in the middle). Hope this helps.
@MidwestDIY
@MidwestDIY 6 жыл бұрын
It looks like Windows 10 (as of January 2018) come with SSH as an optional feature in beta version
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Thanks for the note, Arlan. Yes, it looks like Microsoft is finally embracing SSH (the Powershell team at Microsoft has been pushing for this for a while). It will be interesting to see how rapidly it gets adopted in enterprises. I may have to edit my video to change the "If it is not Windows..." message :-) Thanks again.
@zj4678
@zj4678 4 жыл бұрын
You may want to annotate the video. Windows 10 supports SSH client and server natively :)
@PaulTurnerChannel
@PaulTurnerChannel 4 жыл бұрын
Zaid, good point. Thanks for the feedback.
@bigo025
@bigo025 6 жыл бұрын
Can somebody tell me why did he create a new key pair on server 2 to communicate with server 1, instead of using the old key pair ? Thank you
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Thanks for the question, Kmer. My understanding of your question is you're wondering why the User Keys labeled "A" above Alice are not also used for the User Keys labeled "2" above Server2. The reason is that the User Keys labeled "A" are used by Alice for her access. The User Keys labeled "2" are used by an automated application on Server2 to access Server1. I realize now that is a little confusing. You might want to watch my other video on the Major Components of SSH (kzbin.info/www/bejne/honMXmZvmtGlbLs), which may provide a better explanation. The basic rule is that every entity (whether User or Automated Process) should have its own user keys. Alice has a User Key labeled "A" to access Server1 and Server2. The automated process on Server2 has a different User Key labeled "2" to access Server1. I hope that makes sense.
@bigo025
@bigo025 6 жыл бұрын
Paul Turner it is everything clear now thank you.
@arisgreek8697
@arisgreek8697 5 жыл бұрын
@@PaulTurnerChannel what i do not understand is why should server2 create a new key pair for its interaction with server1? I would expect each entity (laptop,pc,server etc) to create only one asymmetric keys pair for all its ssh (whether it will be a client or a server) interactions.
@PaulTurnerChannel
@PaulTurnerChannel 5 жыл бұрын
@@arisgreek8697 This is a very good question. It is possible to use the host key, used when acting as a server, for client authentication with other systems (acting as servers). That mode is called host-based authentication mode. Generally, it is not recommended. As background, there can be multiple accounts (users and apps) on a system that are able to use SSH. When you configure a system to use host-based authentication, it makes it more difficult to determine which account performed operations. In general, you want to make sure you can clearly see what operations have been performed by each account on a system (since each account has unique credentials and you want to be able to identify who might have done something wrong, etc.). The following paper has a bit more information on this: nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.7966.pdf. I hope this helps. Please tell me if I didn't answer your question clearly.
@liliacfury
@liliacfury 4 жыл бұрын
What’s the purpose of the servers having their own private key? (The orange and blue, not the green.) Now, I understand the purpose of the administrator having a private key, it is needed to initiate the process of the server authenticating that said administrator can be trusted, but why does the server need a private key? The server asks us if we trust it, so does the private key give an extra warning that we can trust it (without it it would give us an extra warning that we can’t trust it?), and it’s just double checking with us (via a prompt using the server’s public key) to make sure that we do trust it? Also, just to clarify, are all of these SSH keys? And similar to public keys from servers needing to be manually verified by the administrator (via prompt), do the servers need to have the administrator manually place their user keys (grey) onto the servers’ authorized keys file? Or is it automated when the server identifies that the user owns a private key?
@PaulTurnerChannel
@PaulTurnerChannel 4 жыл бұрын
These are great questions. #1 - Purpose of Server Private Key: The server authenticates that they are the holder of the public key by signing something for the client with their (the server's) private key (the server public and private keys are mathematically/cryptographically related so that this can be done). Let's say that the client has Server1's public key from a previous connection and later connects to an attacker's server attempting to act as Server1. Since the attacker's server doesn't have the private key that matches Server1 public key, it can't provide a valid digital signature (signing something unique to the session) during the SSH session establishment. Consequently, the client will throw an error and not continue with the connection. #2 - Are these all SSH keys: Yes. All of the keys described in the presentation are SSH keys. And, as you say, the server looks for user public keys placed in authorized_keys files. It uses these public keys to validate that the clients have the corresponding private keys in their possession (using digital signatures as described in the first paragraph above but in the opposite direction, client to server). You also ask about who places the public keys. First, yes, unique client public keys must be explicitly placed in each user's .ssh/authorized_keys file (each matching the private key that the user holds). How these keys get place in the authorized_keys files depends on the policy of the organization. They can be: 1) installed by each user (which is not a recommended practice and should be prevented through configuration), 2) installed by the administrator can manually place them, or 3) they can use an automated system to provision and manage the user public keys. I hope this helps. Please don't hesitate to ask for further clarification if anything didn't make sense.
@marcoangelo
@marcoangelo 7 жыл бұрын
man, turn your audio up
@PaulTurnerChannel
@PaulTurnerChannel 7 жыл бұрын
Thanks, Marco. That was one of my earlier videos before I understood that my phone headset wouldn't hack it as a recording device. Some of us are slow to learn. I appreciate the feedback.
@marcoangelo
@marcoangelo 7 жыл бұрын
Paul Turner sorry hope I didn't sound too rude. Thank you.
@PaulTurnerChannel
@PaulTurnerChannel 7 жыл бұрын
Not at all. I appreciated the feedback. Thanks
@agfagaevart
@agfagaevart 5 жыл бұрын
cool soothing HAL 9000 type voice... :-)
@JohnKatiku
@JohnKatiku 4 жыл бұрын
@@PaulTurnerChannel You made it audible too thank you.
@researches_technical_stuff7392
@researches_technical_stuff7392 5 жыл бұрын
TLS is Transport Layer SECURITY, not Transport Layer Services.
@PaulTurnerChannel
@PaulTurnerChannel 5 жыл бұрын
Doh! Good catch. I can't believe I included in the video.
@researches_technical_stuff7392
@researches_technical_stuff7392 5 жыл бұрын
This is still a superior explanation of the topic, and a good resource. Engineers misspell, misspeak, and flub terminology while still being competent. Thanks for the good work
@MerlinusAmbrosius
@MerlinusAmbrosius 7 жыл бұрын
what are keys ? :D
@PaulTurnerChannel
@PaulTurnerChannel 7 жыл бұрын
Thankks for your comment and question, Mahmmad. I have another video that provides a basic introduction to algorithms, keys, and certificates at kzbin.info/www/bejne/p2rZpmmVZ9djpZY. Not sure if this is what you were looking for. Thanks again.
@Hairregrowthjourney
@Hairregrowthjourney 5 жыл бұрын
I can't hear ya
@PaulTurnerChannel
@PaulTurnerChannel 5 жыл бұрын
:-). Thanks, Saurabh. This was one of my very first videos, before I understood the importance of a good microphone. Sorry about the poor audio quality. Thanks again.
@engalipak
@engalipak 2 жыл бұрын
I maybe the odd one out here. But the keys explanation didn't make any sense to know how they work step by step.
@PaulTurnerChannel
@PaulTurnerChannel 2 жыл бұрын
Hi, Ali. I’ve created another video (kzbin.info/www/bejne/honMXmZvmtGlbLs) that provides a slightly different explanation. If that is not helpful, what were you looking to understand that is not covered?
@DeusVultExitium
@DeusVultExitium 6 жыл бұрын
WHAT, I CANT HEAR THEM, WHAT ARE THEY SELLING?!
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Timothy, I don't understand your comment. Did you have trouble hearing the audio? Also, did you get the impression I was trying to sell something?
@DeusVultExitium
@DeusVultExitium 6 жыл бұрын
Yes. I was satirizing the low audio in the video. It is an internet meme. Thanks for having me explain it.
@sdfasdfsdfklsdfjklsdflsdkl377
@sdfasdfsdfklsdfjklsdflsdkl377 6 жыл бұрын
your video takes 13:37 minutes :p
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Yes, it is quite long. I have a problem communicating concepts in a succinct manner. Still working on that. Thanks.
@luacode.x1249
@luacode.x1249 6 жыл бұрын
It's a joke, right? Only 446 subscribers? This is as unfair as, lets say, Jesus scarifying himself in solitude and being forgotten by men or history. People are stupid. SSH IS GREAT! And wait, did I write 446? I meant 447, mb ;)
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Thanks for your comment, Lua, and for subscribing. It is safe to say that Jesus is in a completely different league :-)
@NadeemInamdar
@NadeemInamdar 4 жыл бұрын
Good video. But the voice of the narrator is feeble.
@PaulTurnerChannel
@PaulTurnerChannel 4 жыл бұрын
Nadeem, when I read your comment this morning, it caused me to break out laughing out loud. I haven’t been called feeble too often. I apologize for the poor audio. I recorded that video before I understood the importance of a good microphone, though I may still sound feeble in some of my other videos as well. At any rate, I appreciate you taking the time to comment and give me a good laugh (I didn’t take your comment as a slight). I wish you all the best. Thank you.
@junjecguatno8584
@junjecguatno8584 6 жыл бұрын
come on dont be shy turn yo voice up for god sake
@PaulTurnerChannel
@PaulTurnerChannel 6 жыл бұрын
Sorry, Honhek. This was one of my first videos, before I understood the importance of a good mic. I got a better mic a little later so my other videos hopefully have clearer audio. Thanks for watching and enduring the poor audio.
@junjecguatno8584
@junjecguatno8584 6 жыл бұрын
all good man, keep up the good work. cheers
@aathithrajendran6463
@aathithrajendran6463 4 жыл бұрын
audio sucks
@PaulTurnerChannel
@PaulTurnerChannel 4 жыл бұрын
Thanks for taking the time to provide feedback. This was one of my first videos, before I understood the importance of a good mic. Sorry that the audio is not good in the video.
The Beginner's Guide To SSH
20:10
DistroTube
Рет қаралды 52 М.
How SSH Works
8:54
Mental Outlaw
Рет қаралды 458 М.
О, сосисочки! (Или корейская уличная еда?)
00:32
Кушать Хочу
Рет қаралды 6 МЛН
TLS Handshake - EVERYTHING that happens when you visit an HTTPS website
27:59
Practical Networking
Рет қаралды 99 М.
SSH Tunneling Explained
6:37
Tinkernut
Рет қаралды 463 М.
How SSH Works
10:02
Mental Outlaw
Рет қаралды 39 М.
How Does Linux Boot Process Work?
4:44
ByteByteGo
Рет қаралды 488 М.
9 - Cryptography Basics - SSH Protocol Explained
17:02
CBTVid
Рет қаралды 32 М.
Linux File System/Structure Explained!
15:59
DorianDotSlash
Рет қаралды 3,9 МЛН
How Secure Shell Works (SSH) - Computerphile
9:20
Computerphile
Рет қаралды 808 М.
Network Ports Explained
10:33
PowerCert Animated Videos
Рет қаралды 1,4 МЛН
Learn SSH In 6 Minutes - Beginners Guide to SSH Tutorial
6:04
Code With Bubb
Рет қаралды 474 М.