Тёмный

School Of Basics | What is SSH | How SSH works 

Automation Step by Step
Подписаться 522 тыс.
Просмотров 107 тыс.
50% 1

more about Raghav - automationstepbystep.com/
Story of SSH - automationstepbystep.com/2020...
You can support my mission for education by joining this channel as member - ru-vid.com...
Hi, I am Raghav and today we will learn -
What is SSH
How SSH Works
Why SSH was created
SSH Client
SSH Server
SSH Authentication
Public & Private Keys
Hit Like and. Subscribe button, if you like this video. It gives me great motivation.
You can support my mission for education by sharing this knowledge and helping as many people as you can
If my work has helped you, consider helping any animal near you, in any way you can.
Other topics in School of Basics
How Appium works - • School Of Basics | How...
How Selenium works - • | School Of Basics | S...
What is API - • School Of Basics | Wha...
How API works - • School Of Basics | API...

Опубликовано:

 

26 июл 2020

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 233   
@svetanayanr8930
@svetanayanr8930 4 года назад
It is like.. I have a doubt.. i come to your channel with 0 knowledge.. search the keyword.. get it here.. and i definetely go back with a good content.. You are actually creating livelihoods for people with your knowledge.. (PS: and then i show off my knowledge :D ha ha) Thanks a lot.. please continue educating us..!!
@RaghavPal
@RaghavPal 4 года назад
So humbled to read your message Sveta
@michaelrider9067
@michaelrider9067 2 года назад
Today was my first day on the job as a junior dev(just transitioned careers ), and SSH kicked my butt while I was trying to set up my dev environment. I've spent my afternoon after work watching videos and researching SSH. This is easily the best video on SSH. Thank you for sharing this information with the community.
@RaghavPal
@RaghavPal 2 года назад
So happy to know it
@anakie9660
@anakie9660 2 года назад
true this one helped me a lot
@AbdulRehman-pc2xx
@AbdulRehman-pc2xx 3 года назад
From Lahore Pakistan. ALLAH bless you, Ameen. You explained this SSH in a very super duper easy way. And Yes Sir please stay home and stay safe. MAY ALLAH take India out from this hell situation Ameen.
@PrabasView
@PrabasView 4 года назад
The Day begins with your video about SSH. It was awesome and clear explanation with example. Thanks Raghav.
@RaghavPal
@RaghavPal 4 года назад
Most welcome!
@scottrussell6873
@scottrussell6873 3 года назад
Thank you! I finally understand how public/private key encryption works!
@RaghavPal
@RaghavPal 3 года назад
Glad it helped Scott
@dayanandswami8109
@dayanandswami8109 8 месяцев назад
really, this box example now clear the funda of ssh that how it is secure & how it works. Thanks for making this valuable video.
@RaghavPal
@RaghavPal 8 месяцев назад
Glad it helped Dayanand
@JPH-ps6ic
@JPH-ps6ic 3 месяца назад
Raghav - thank you for this video. It is super helpful to me. But I have one question about the two key process. At 9:51 in the video, this makes sense, but I recently saw a different video describing it in this way -> Step 1: Client sends connection request to Server. Step 2: Server sends Client a random string that is encrypted using the Public Key Step 3: Client DECRYPTS this random string using the Private Key, and sends back information to the Server that proves that it indeed decrypted it. Step 4: Server authenticates this information. As you can tell, this process that I described is similar, but the client does the decrypting. In your video, Step 3 shows the client ENCRYPTING the message for the SERVER to decrypt. I wanted to ask you if both processes are viable, and if they have different names, or if one of these processes is incorrect. Trying to sort this stuff out while learning about SSH and any input would be greatly appreciated!
@RaghavPal
@RaghavPal 3 месяца назад
JP Let's delve into the intricacies of SSH key-based authentication. It's great that you're exploring this topic, and I'll clarify the processes for you. 1. SSH Key Pair Generation: - Client: The client generates an SSH key pair consisting of a public key and a private key. - Public Key: The public key is shared with the server. - Private Key: The private key remains securely on the client machine. 2. Server Configuration: - The server stores the client's public key in a special file (usually `~/.ssh/authorized_keys`). - The server marks the public key as approved for authentication. 3. Authentication Process: - When the client connects to the server: - The server sends a random string to the client. - The client encrypts this random string using its private key. - The client sends the encrypted string back to the server. - The server decrypts the received string using the public key. - If successful, the server authenticates the client. Now, let's address the difference you noticed: - Your Description: - The client decrypts the random string using its private key. - The client then sends back information to the server. - The server authenticates based on this information. - Video Description (as per your observation): - The client encrypts the random string using its private key. - The server decrypts the received string using the client's public key. - If successful, the server authenticates the client. Both processes are viable and achieve the same goal: secure authentication using SSH keys. The video's approach emphasizes the client's role in encrypting the message, while your description highlights the client's role in decrypting it. These are two sides of the same cryptographic coin In summary, both methods are correct, and they don't have different names. The key pair ensures secure communication, and the specific steps may vary slightly in how they're described Keep exploring, and feel free to ask more questions as you learn..
@arun53413
@arun53413 4 года назад
Hi Raghav, It was a good Explanation. You are doing a Great Job of sharing your knowledge which is helping many of us. Keep up the Good Work !!
@RaghavPal
@RaghavPal 4 года назад
Most welcome Arun
@sundarmishra561
@sundarmishra561 2 года назад
Thank you for providing this great resource. Very grateful to you.🤝👏👏
@RaghavPal
@RaghavPal 2 года назад
Most welcome Sundar
@RachitMalvi
@RachitMalvi 3 года назад
Thank you, Raghav. Great expalination!
@RaghavPal
@RaghavPal 3 года назад
Most welcome Rachit
@hariprasath838
@hariprasath838 2 года назад
Thank you so much sir. I heard this term yesterday. And I can say now, that I know that how SSH is working in basic level. I loved the way you had explained using transferring locked box between two friends. Thank you so much sir:)
@RaghavPal
@RaghavPal 2 года назад
Excellent Hari
@bandlamudi1206
@bandlamudi1206 3 года назад
Really a nice video, I did watch few videos so far, did not get clear idea about ssh process. The way you presented the topic is awesome. Thank you Raghav
@RaghavPal
@RaghavPal 3 года назад
You are most welcome
@nandhinirajendran1396
@nandhinirajendran1396 4 года назад
You are my guru for years 🙏🏼🙏🏼🙏🏼🙏🏼
@RaghavPal
@RaghavPal 4 года назад
Humbled to know this Nandhini
@jaikishank
@jaikishank 2 года назад
Thanks for the clear explanation in the video. Deeply appreciate your knowledge sharing...
@RaghavPal
@RaghavPal 2 года назад
Glad it was helpful Jaikishan
@tomriddle2427
@tomriddle2427 3 года назад
Brilliant it was the way you explained can't be any simpler, thank-you
@RaghavPal
@RaghavPal 3 года назад
You're welcome!
@sandeep87raju
@sandeep87raju 4 года назад
Such a wonderful explanation Raghav. You are a great guy :)..
@RaghavPal
@RaghavPal 4 года назад
Thanks for watching Sandeep
@madhavans8442
@madhavans8442 3 года назад
please continue educating us.Thanks!
@RaghavPal
@RaghavPal 3 года назад
Most welcome Madhavan
@codenexa1666
@codenexa1666 10 месяцев назад
It is simply an amazing overview, On point explanation. Thanks for sharing amazing information. Keep uploading this kind of informative videos for us.
@RaghavPal
@RaghavPal 10 месяцев назад
So nice of you
@radhikarao5106
@radhikarao5106 3 года назад
Great Explanation! Can you please explain how SSL and SSL certs work with an analogy? If you can show us how to Create and replace certs in a server that would be great!!
@RaghavPal
@RaghavPal 3 года назад
Sure Radhika, I will plan a session
@grigoriyz
@grigoriyz 3 года назад
Thank you for easy explanation! Good job!
@RaghavPal
@RaghavPal 3 года назад
Most welcome
@luckyadeloye3452
@luckyadeloye3452 2 года назад
Thank you so much for this video and the link to the conversation between mickey and minnie on ssh.
@RaghavPal
@RaghavPal 2 года назад
Most welcome Lucky
@toallin150
@toallin150 3 года назад
Thank you Raghav 🙌 . Great explanation!
@RaghavPal
@RaghavPal 3 года назад
Glad it was helpful!
@santoshbehera9261
@santoshbehera9261 3 года назад
Thank you for getting the knowledge from you I searched for.
@RaghavPal
@RaghavPal 3 года назад
Most welcome Santosh
@jimmelbermudez
@jimmelbermudez 2 года назад
Thank you very much Sir . Your student from Philippines ☺️
@RaghavPal
@RaghavPal 2 года назад
You are very welcome Jimmel
@shrutibansal5261
@shrutibansal5261 2 года назад
Great video
@poojagupta-nk7rq
@poojagupta-nk7rq 3 года назад
sir you are simply best i am working past 1 year but today i understood exact scene thankyou my teacher
@RaghavPal
@RaghavPal 3 года назад
You are most welcome Pooja
@rageshnc
@rageshnc 3 года назад
Thank you for the short but clear explanation....
@RaghavPal
@RaghavPal 3 года назад
Glad it was helpful Ragesh
@neelakantannilakantanswami4031
@neelakantannilakantanswami4031 2 года назад
Thanks for the info . Keep continuing your good work
@RaghavPal
@RaghavPal 2 года назад
Thanks, will do!
@mahimahesh5616
@mahimahesh5616 4 года назад
It would be helpful if u make videos to clear interviews explaining real time scenerios
@RaghavPal
@RaghavPal 4 года назад
I will do
@saifuddinraj8774
@saifuddinraj8774 4 года назад
Awesome explanation. Thank you 😊
@RaghavPal
@RaghavPal 4 года назад
Most welcome Saifuddin
@ekleanthony7735
@ekleanthony7735 2 года назад
Nice video.. Thanks for the explicit and careful explanation.
@RaghavPal
@RaghavPal 2 года назад
Glad it was helpful
@karthiknarayan8
@karthiknarayan8 2 года назад
Thank you for the simple explanation..really helpful.🙏
@RaghavPal
@RaghavPal 2 года назад
Most welcome
@shadow_self8564
@shadow_self8564 3 года назад
Beautifully explained. Thanks
@RaghavPal
@RaghavPal 3 года назад
Most welcome Saurabh
@odunayokomolafe9485
@odunayokomolafe9485 2 года назад
Great presentation!
@RaghavPal
@RaghavPal 2 года назад
Thanks for watching Odunayo
@elaveniltharumarasan5484
@elaveniltharumarasan5484 9 месяцев назад
Very nicely done! Thank you!
@RaghavPal
@RaghavPal 9 месяцев назад
Most welcome Elavenil
@ThePuneet681
@ThePuneet681 3 года назад
Simple and clear explanation, thanks 🙏
@RaghavPal
@RaghavPal 3 года назад
Glad it was helpful!
@shaikhanuman8012
@shaikhanuman8012 2 года назад
Great Content sir. Tq for providing.
@RaghavPal
@RaghavPal 2 года назад
Always welcome
@rajeeshnangariyil3600
@rajeeshnangariyil3600 2 года назад
These information are gold dust
@RaghavPal
@RaghavPal 2 года назад
Thanks Rajeesh
@wmchow8943
@wmchow8943 Год назад
Very well explained and used Git as example make it more easy to understand
@RaghavPal
@RaghavPal Год назад
Thanks a lot
@GaneshNayak
@GaneshNayak 3 года назад
Too good man.. very well explained..
@RaghavPal
@RaghavPal 3 года назад
Thanks a ton Ganesh
@ayushpatel2171
@ayushpatel2171 2 года назад
Nice explanation sir thank you very much.
@RaghavPal
@RaghavPal 2 года назад
You are most welcome Ayush
@dineshdewangan8390
@dineshdewangan8390 4 года назад
Great sir, Waiting for next..
@RaghavPal
@RaghavPal 4 года назад
Will be coming next week Dinesh
@seydangulyesil
@seydangulyesil 4 месяца назад
it's absolutely great explain 👏👏👏
@RaghavPal
@RaghavPal 4 месяца назад
Glad it was helpful!
@manojkumarneesu2773
@manojkumarneesu2773 2 года назад
in my hpc server my gpu node is showing down how to activate it using ssh commands can you please tell me
@RaghavPal
@RaghavPal 2 года назад
Hi Manoj, I will need to check details
@sophiyaanudeep9397
@sophiyaanudeep9397 2 года назад
Miraculous explanation... crystal clear...
@RaghavPal
@RaghavPal 2 года назад
Thanks Sophiya
@rogerthat7190
@rogerthat7190 Год назад
Thank you sir for the clear explanation
@RaghavPal
@RaghavPal Год назад
Most welcome
@mohammadahmedragab837
@mohammadahmedragab837 2 года назад
thank you so much , great explanation
@RaghavPal
@RaghavPal 2 года назад
Most welcome Ahmed
@JohnJohnson-sf5wl
@JohnJohnson-sf5wl 2 года назад
Thanks for the simple explanations
@RaghavPal
@RaghavPal 2 года назад
You're welcome John
@biswabhusanswain7528
@biswabhusanswain7528 2 года назад
Thanks for clearing my doubt 🙏🙏🙏
@RaghavPal
@RaghavPal 2 года назад
Most welcome Biswa
@yavdhesh
@yavdhesh 3 года назад
dhanywaada guruji
@RaghavPal
@RaghavPal 3 года назад
Most welcome Yogesh
@ravimohanboggula8117
@ravimohanboggula8117 4 года назад
NICE Job Raghav like the series school of basics, I would appreciate if you could discuss about Installing SSL certificates and how they work too
@RaghavPal
@RaghavPal 4 года назад
Sure Ravi, Keep learning
@srikanthgandhi7289
@srikanthgandhi7289 2 года назад
Very clear Explanation. 🙏 thanks lot
@RaghavPal
@RaghavPal 2 года назад
Most welcome Srikanth
@kamaleshpramanik7645
@kamaleshpramanik7645 2 года назад
This is superb ... Thank you very much Sir.
@RaghavPal
@RaghavPal 2 года назад
You are most welcome Kamalesh
@whattheydoexactly7794
@whattheydoexactly7794 4 года назад
thank you for such wonderful explanation
@RaghavPal
@RaghavPal 4 года назад
Most welcome Nachiket
@RahulWalli
@RahulWalli Год назад
Thank you so much for this video 💓
@RaghavPal
@RaghavPal Год назад
Most welcome 😊
@MiraclesU123.
@MiraclesU123. 3 года назад
Nice and simple explanation!
@RaghavPal
@RaghavPal 3 года назад
Glad it was helpful!
@vitteshwarayaramanavenky2187
@vitteshwarayaramanavenky2187 3 года назад
Explained very well,I thanking you sir
@RaghavPal
@RaghavPal 3 года назад
You are welcome
@eugenegorodetsky6494
@eugenegorodetsky6494 3 года назад
thanks ! really helpfull
@RaghavPal
@RaghavPal 3 года назад
Most welcome Eugene
@singaravelann3671
@singaravelann3671 4 года назад
If in server we have a more number of public keys how the server identifies using which key it should decrypt the message??
@RaghavPal
@RaghavPal 4 года назад
Hi Singaravelan, there is cryptographic fingerprint that is used to uniquely identify the keys.
@vaibhavppandey
@vaibhavppandey 3 года назад
Very good explanation sir. Thank you very much :)
@RaghavPal
@RaghavPal 3 года назад
You are most welcome
@kommuram5435
@kommuram5435 4 года назад
Hi Raghav, thanks for the valuable info. Can you please explain how ssl works and how to setup on aws and Onpremise servers
@RaghavPal
@RaghavPal 4 года назад
I will plan for that Ram
@kommuram5435
@kommuram5435 4 года назад
@@RaghavPal thanks Raghav
@arunbandari8936
@arunbandari8936 2 года назад
Hi Sir In Password-based authentication, if I enter a password and click on ENTER button. Now hackers may see my password in between the client and server channel. when the secure connection will be open, after the correct password providing or before.
@RaghavPal
@RaghavPal 2 года назад
Hi Arun, will check on this
@arunbandari8936
@arunbandari8936 2 года назад
@@RaghavPal hi sir did you got any information?
@NehaYT
@NehaYT 9 месяцев назад
Very well explained sir 🎉
@RaghavPal
@RaghavPal 9 месяцев назад
Thanks and welcome Neha
@sarthakgupta7955
@sarthakgupta7955 Год назад
does the two lock mechanism happen in every message exchange?
@RaghavPal
@RaghavPal Год назад
Hi Sarthak Both these mechanisms are performed during the initial setup phase of an SSH session, and are not repeated in every message exchange. However, they are in place throughout the duration of the SSH session to ensure message integrity and prevent packet loss due to interleaving.
@dhevanrajandran7632
@dhevanrajandran7632 2 года назад
Great video :)
@RaghavPal
@RaghavPal 2 года назад
Thanks Dhevan
@kedardeuskar3865
@kedardeuskar3865 3 года назад
Nice Explanation of SSH
@RaghavPal
@RaghavPal 3 года назад
Glad it was helpful Kedar
@avakasavaadhi4726
@avakasavaadhi4726 2 года назад
May I know which port is used when 2 machines communicate over SSH?
@RaghavPal
@RaghavPal 2 года назад
default is port 22, but this can change
@devyetii
@devyetii 4 года назад
Thank you Raghav ❤️. I've a question .. can't a man in the middle steal this "box" of info by attaching his key ? Is there any check on the sent key ?
@RaghavPal
@RaghavPal 4 года назад
Hi Ebrahim, the person needs to have the authentic private key. Also it is recommended to secure your private key with password, so just in case someone gets access to you private key, he will still need to provide password to use it.
@devyetii
@devyetii 4 года назад
@@RaghavPal Got it! Many thanks for your reply 💜
@arunprasad8261
@arunprasad8261 3 года назад
nice lecture on SSH. thanks
@RaghavPal
@RaghavPal 3 года назад
Most welcome Arun
@vetribull8318
@vetribull8318 3 года назад
Hi Raghav, Thank you very much for your explanation. Got any chances to migrate openssh key from windows to another windows ?
@RaghavPal
@RaghavPal 3 года назад
Not yet, will need to check online
@vetribull8318
@vetribull8318 3 года назад
@@RaghavPal Thanks Raghav
@BlokeBritish
@BlokeBritish 3 года назад
u say tat the security is coz of encryption. so if not encrypted then wat exactly is the risk ? do u mean a hacker cn use some tools to do network sniffing and get access to the data or sumthing like tat ?? coz im new to all this and im confused wen i hear things like "not secure" ive also heard tat in http vs https
@RaghavPal
@RaghavPal 3 года назад
Hi Czar, yes so without encryption it will be a step easier for hackers, I am going a plan a security testing Q&A soon. that will help
@BlokeBritish
@BlokeBritish 3 года назад
@@RaghavPal thanks man
@karteeshv
@karteeshv 3 года назад
Main thing in SSH is related to keys.. but u explained that part in just a minute.
@RaghavPal
@RaghavPal 3 года назад
Thanks for watching Karteesh
@xyz123636
@xyz123636 4 года назад
Your all videos are very helpful. If possible, please create few videos for shell scripting topic. Thanks for creating nice videos, God bless
@RaghavPal
@RaghavPal 4 года назад
Sure, I will do
@tulasiramsunkara
@tulasiramsunkara 4 года назад
Excellent explanation 👌👏👏👏👏
@RaghavPal
@RaghavPal 4 года назад
Thanks for watching Tulasi
@chaitanyakrishna9398
@chaitanyakrishna9398 3 года назад
So helpful.
@RaghavPal
@RaghavPal 3 года назад
Glad it was helpful Chaitanya
@tanveersyed1049
@tanveersyed1049 4 года назад
Thanks ...Nice explanation
@RaghavPal
@RaghavPal 4 года назад
You are welcome Tanveer
@vkrishna606
@vkrishna606 2 года назад
well explained
@RaghavPal
@RaghavPal 2 года назад
Thanks Vamsi
@oguzhantopaloglu9442
@oguzhantopaloglu9442 Год назад
Amazing video
@RaghavPal
@RaghavPal Год назад
Thanks
@Manish_Kumar_Bihar
@Manish_Kumar_Bihar 3 года назад
nice sir ,u explain very well!!!
@RaghavPal
@RaghavPal 3 года назад
Thanks and welcome Manish
@aditifabregas
@aditifabregas 2 года назад
How can the server (remote machine) decrypt with public key? Then the very purpose of encryption is lost.
@RaghavPal
@RaghavPal 2 года назад
I will try to add a detailed session Aditi
@priyaigu1306
@priyaigu1306 2 года назад
Hi Raghav, I am getting permission denied all the time when i try to enter into the machine, passwords are correct. The first step runs successfully (sequence completed) but in the very next step when i enter password, permission denied. How to solve this problem??
@RaghavPal
@RaghavPal Год назад
Hi Priya, will need to check your setup
@priyaigu1306
@priyaigu1306 Год назад
@@RaghavPal Please suggest a way to check setup??
@MahaPSaranu
@MahaPSaranu 4 года назад
Bless you Raghav. So simple and useful explanation. Please could you also explain about Putty ?
@RaghavPal
@RaghavPal 4 года назад
I will do Peddi
@canadatorontovideos7283
@canadatorontovideos7283 4 года назад
Kindly need a step by step video on automation testing about azure data lake/factory/blob etc.
@RaghavPal
@RaghavPal 4 года назад
Will check on this Suhasini
@canadatorontovideos7283
@canadatorontovideos7283 4 года назад
@@RaghavPal thank you raghav
@anuragsandhu9590
@anuragsandhu9590 4 года назад
Amazing
@RaghavPal
@RaghavPal 4 года назад
Thanks for watching
@abhaypatidar7948
@abhaypatidar7948 3 года назад
Hello Sir, I watched your video to understand the ssh. I have a doubt over the flow that you explained in the last. As we know that ssh uses public-key cryptography where a message encrypted using public can only be decrypted by its private key. But in your flow, at last, you said that the client encrypts the message sent by the server with the private key, and then sends it to the server, then the server decrypts it using the public key.
@RaghavPal
@RaghavPal 3 года назад
Hi Abhay, pls check this too - automationstepbystep.com/2020/07/23/a-story-of-ssh-secure-shell/
@abhaypatidar7948
@abhaypatidar7948 3 года назад
@@RaghavPal Thank you sir, do we have more link that shows actually how authentication takes place.
@RaghavPal
@RaghavPal 3 года назад
will need to search more online
@gxp9223
@gxp9223 2 года назад
you need to make a correction. encryption happens using the public key and decryption happens using the private key
@abdul9910
@abdul9910 3 года назад
I like a lot your videos keep going on
@RaghavPal
@RaghavPal 3 года назад
Thanks, will do Abdul
@honeybunny9977
@honeybunny9977 4 года назад
Do you have any video on github n gitlab for beginners?
@RaghavPal
@RaghavPal 4 года назад
Yes, pls check here - automationstepbystep.com/
@tarunarora3266
@tarunarora3266 2 года назад
nice introduction
@RaghavPal
@RaghavPal Год назад
thanks Tarun
@toshitsingh7270
@toshitsingh7270 2 года назад
Damm nailed the explanation 👏
@RaghavPal
@RaghavPal 2 года назад
Thanks Toshit
@devendradhillon4204
@devendradhillon4204 3 года назад
Good explanation
@RaghavPal
@RaghavPal 3 года назад
Thanks and welcome Devendra
@ywahab25
@ywahab25 9 месяцев назад
good explanation my dear
@RaghavPal
@RaghavPal 9 месяцев назад
Thank you 🙂
@priyapatel8711
@priyapatel8711 Год назад
Nice Video :)
@RaghavPal
@RaghavPal Год назад
Thanks for the visit
@abdullamasud4278
@abdullamasud4278 Год назад
If someone has my private key, will that someone be able to encrypt the random message and access the remote system? if so, what makes it different than using a password? I am sorry if I sound naive here ^^ Just trying to understand it better
@RaghavPal
@RaghavPal Год назад
Hi Abdulla, this has good explanation of this concept www.ssh.com/academy/ssh/public-key-authentication sectigo.com/resource-library/what-is-an-ssh-key
@RaghavPal
@RaghavPal Год назад
Hi Abdulla, this has good explanation of this concept sectigo.com/resource-library/what-is-an-ssh-key www.ssh.com/academy/ssh/public-key-authentication
@thebattinson1278
@thebattinson1278 Год назад
Then u are fucked 🤣 To be serious, a private key is way more secure than a password and cannot be brute forced. U can also add a layer of security with a passphrase for your private key. So if someone stole your private key, he won't be able to use it in another machine.
@sailakshmankinthali6501
@sailakshmankinthali6501 2 года назад
Super explanation
@RaghavPal
@RaghavPal 2 года назад
Thanks Sai
@PoornaCW
@PoornaCW 2 года назад
Thank you so much
@RaghavPal
@RaghavPal 2 года назад
Most welcome Poorna
@bharathkumarchalla3558
@bharathkumarchalla3558 2 года назад
thankyou so much its very small word to say....but thanks
@Rhythmicwalker
@Rhythmicwalker 4 года назад
Very nice 👍
@RaghavPal
@RaghavPal 4 года назад
Thanks for watching Prakash
@honeybunny9977
@honeybunny9977 4 года назад
Hi Raghav....what is the difference between Putty and ZOC?
@RaghavPal
@RaghavPal 4 года назад
Hi, I have not used ZOC, Can find more here - en.wikipedia.org/wiki/Comparison_of_SSH_clients www.slant.co/versus/499/5495/~putty_vs_zoc-terminal
@kartik6561
@kartik6561 4 года назад
Can you explain ssl how it is working
@RaghavPal
@RaghavPal 4 года назад
Hi Kartik, I touched the basics in this video. Will plan for a more detailed session too
@NikhilSingh-hc7td
@NikhilSingh-hc7td 3 года назад
thanks sir
@RaghavPal
@RaghavPal 3 года назад
Most welcome Nikhil
Далее
School Of Basics | What is IoT | Internet Of Things
4:28
Beautiful sport😍
00:20
Просмотров 168 тыс.
شربت كل الماء؟ 🤣
00:31
Просмотров 15 млн
How SSH Works
8:54
Просмотров 499 тыс.
SSH Keys
10:12
Просмотров 105 тыс.
SSH Crash Course | With Some DevOps
55:02
Просмотров 549 тыс.
What is a Server? (Deepdive)
17:51
Просмотров 168 тыс.
How Secure Shell Works (SSH) - Computerphile
9:20
Просмотров 814 тыс.
The Beginner's Guide To SSH
20:10
Просмотров 55 тыс.
Intro to SSH and SSH Keys
13:38
Просмотров 135 тыс.
9 - Cryptography Basics - SSH Protocol Explained
17:02