Difference between revisions of "Introduction to Linux in HPC/SSH Connections"
Introduction to Linux in HPC/SSH Connections
Jump to navigation
Jump to search
Line 42: | Line 42: | ||
page 10: | page 10: | ||
Overview of best practices for SSH login | Overview of best practices for SSH login | ||
+ | |||
+ | |||
+ | |||
+ | {{quiz_box|'''no quiz in this section'''}} | ||
+ | |||
+ | {{Warning|mode=info|text= '''no tips in this section'''}} | ||
+ | |||
+ | {{Warning|mode=warn|text= '''no warnings in this section'''}} | ||
+ | |||
+ | |||
+ | {{Note|'''Exercises in Terminal: no exercises in this section'''}} |
Revision as of 13:21, 2 October 2020
Video
SSH Einloggen Slides 3 - 40 (38 pages)
Slide Layout
page 2: HPC users use SSH to login What is SSH What is OpenSSH page 3: Encryption: plaintext <--> ciphertext Caesar cipher Alice, Bob and Charlie page 4: Symmetric encryption: use the same key for both encryption and decryption Major problem: how to share the key without interception page 5: Asymmetric encryption: use private/public key pair Example: Alice <--> Bob page 6: Example: ? <--> Bob Solution: digital signature page 7: What is digital signature Example: Alice <--> Bob page 8: OpenSSH contains a suite of utilities OpenSSH is also available on Windows There are other SSH clients on Windows page 9: Overview of best practices for SSH login page 10: Overview of best practices for SSH login
Info: | no tips in this section |
Warning: | no warnings in this section |