Using keys: Difference between revisions
added telnet example |
references better external article |
||
| Line 1: | Line 1: | ||
There are a lot of things you can do with computers to create security, that's why '''Security is a process, not a product'''. One such thing is to use SSH Keys to authenticate with a remote host, rather than typing in your password all the time. Of course, using SSH Authentication keys is convenient as well. | There are a lot of things you can do with computers to create security, that's why '''Security is a process, not a product'''. One such thing is to use SSH Keys to authenticate with a remote host, rather than typing in your password all the time. Of course, using SSH Authentication keys is convenient as well. | ||
{{Messagebox | |||
| type = success | |||
| text = Visit http://www.noah.org/wiki/SSH_public_keys for a better and more in-depth look at using SSH keys}} | |||
== Secure Shell Key Authentication == | == Secure Shell Key Authentication == | ||