Using keys: Difference between revisions

added telnet example
references better external article
Line 1: Line 1:
There are a lot of things you can do with computers to create security, that's why '''Security is a process, not a product'''.  One such thing is to use SSH Keys to authenticate with a remote host, rather than typing in your password all the time.  Of course, using SSH Authentication keys is convenient as well.
There are a lot of things you can do with computers to create security, that's why '''Security is a process, not a product'''.  One such thing is to use SSH Keys to authenticate with a remote host, rather than typing in your password all the time.  Of course, using SSH Authentication keys is convenient as well.
{{Messagebox
| type = success
| text = Visit http://www.noah.org/wiki/SSH_public_keys for a better and more in-depth look at using SSH keys}}


== Secure Shell Key Authentication ==
== Secure Shell Key Authentication ==