Размер видео: 1280 X 720853 X 480640 X 360
Показать панель управления
Автовоспроизведение
Автоповтор
@14:00-15:00 you can always run ssh-keyscan and get the administrator of the other machine on the phone before blindly accepting the key. Or use certs. 🙂
I really hope a later episode will go over the use of certificates as an option to the ssh keys being demonstrated here.
Hey! Can you go over in s later episode the use of certificates as an option to the ssh keys?
The beard is enough to block any ssh connection attempt
Snort is the port knocking intrusion detection Damon
@14:00-15:00 you can always run ssh-keyscan and get the administrator of the other machine on the phone before blindly accepting the key. Or use certs. 🙂
I really hope a later episode will go over the use of certificates as an option to the ssh keys being demonstrated here.
Hey! Can you go over in s later episode the use of certificates as an option to the ssh keys?
The beard is enough to block any ssh connection attempt
Snort is the port knocking intrusion detection Damon