Hello, I don’t mean to intrude, but might you assist me with something? In my OKX wallet, I hold USDT TRX20 and the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ]. How can I send it to Binance or Bybit?
Hello, I hate to interrupt, but might you lend a hand? USDT TRX20 and my recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ] are in my OKX wallet How do I move it to Binance or Bybit?
Hey, sorry to disrupt you, but could you assist me? USDT TRX20 is stored in my OKX wallet, and I’ve saved my recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ]. How do I transfer it to Binance or Bybit?
Im studying for my sec + and i’m reading on ssh and I youtubed it. Your video came up. I clicked it. Best decision i made this morning. Your teaching is clear, fun, and direct. Thank you sir.
I came here trying to figure out what would happen to an 'ssh' 'no password' connection in a network load balance environment. I needed some foundational stuff explained simply and quickly and got exactly what I was looking for. I wish I had professors like this when I was taking classes. Easy to understand, awesome reverse writing so he is always facing the classroom and a thrown in quote from 'Hackers'. 5/5 stars.
Hey, I need some assistance-could you help me out? In my OKX wallet, I have USDT TRX20 and the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ]. How do I send it to Binance or Bybit?
Thanks a lot for the clear and easy explanation of 'ssh'. I have a question: Does the 'public key' generated by the 'server' relies on the 'private key' kept on the private computer/laptop? Thanks Edit: My query got answered at 6:30 Thanks
The professor's explanation mixes up key concepts. In SSH authentication, the server sends a random challenge, your client signs it with the private key, and the server verifies the signature with the public key. No encryption/decryption happens-it's about signing and verifying, not "decrypting" the challenge.
Wonderful explaination. Pls answer this query if possible related to this topic.. We download the 'private key' over the internet from AWS. Dsnt it makes the private key insecure as it was not on our laptop in the 1st place !!?? And got downloaded from AWS externally.
No need for Putty in Windows, you can "Add / Remove Features" from Settings / Control Panel and add OpenSSH (11MB), then you can access all ssh commands from terminal.
Could you please explain how you write in reverse ? I came to learn ssh keys but took out a paper and started writing the way he is writing.... Couldn't do it though..... It took a lot of efforts ..... Congo on that
Thanks for the forecast! Could you help me with something unrelated: My okx wallet holds some USDT, and I have the seed phrase: (tag suit turtle raccoon orange fever main skull special hungry crystal mixture). What's the way to send them to Binance?
I have worked with computers for over 40 years, and I can confirm the computer with more blinking lights is the more important and powerful. Watch any movies from the 60s and see the computers have a wall of flashing lights, i.e. Lost in Space
Now, if someone were eavesdropping on the link and picked up both the encrypted stream and decrypted one, could they somehow back out the private key from that? I assume no.
Machine 1: Client Machine 2: Server 1. Generate SSH key pair on your client machine. 2. Add your public key to the server machine. 3. Now while connecting to the server our machine will request the server for connection and the rest will happen.
question when i generate keys on linux it generates a private and public am i supposed to copy the private key to the computer i want to ssh from? i think ive buggerd my linux os and cigwin up ive generated multiple keys in diffrent directorys to try to get it to work the closest i get is ssh user@ > password: the connection was rejected (key,password ) what am i doing wrong?
Totally off topic, but I’ve always wondered how this drawing board overlay works. He seems to be writing on a physical surface, as I even hear the squeaks of the markers. It looks like the drawing surface is between him and the camera. And I assume he hasn’t learned to draw and write backwards just to use this tool. So I assume he’s writing normally. But if that were the case, I’d see the image reversed. But it looks normal. It’s a cool magic trick. I don’t think he’s recording this twice and then compositing the two videos with the drawing surface reversed. Somehow, he’s facing the camera, drawing on a surface between himself and the camera, which appears to be transparent, and yet the image on the surface is being reversed in real time. If anyone knows the secret and ever reads this on this 5 year old video, I would appreciate the info! Thanks. 😊
So you said that the public key can be shared with anyone, even with a suspicious website and that would cause no harm. But if MITM attack happens and the attacker has our public key, wouldn't that mean he might be able to fool the user into ssh'ing into some proxy and steal data?
It's funny how putty is supposed to be the gatekeeper of security but it's website (at least when this was recorded) isn't using tsl and is very unsafe lol no matter, these days you don't even need putty. Just ssh straight from terminal (no need for putty or wsl), heck ssh from 10 panes from one terminal lol
tbh you've made this overcomplicated as you've not initially provided the context, most people associate the server end with a web server, not a server you're connecting to... You them made it more confusing by using Amazon Web services. 🙃 i.e. really didn't lay out the context well. It would have been much less confusing by using a web server with the private key, signed by a CA then using the public key on the client as that generally the standard use case..If you'd have explained the context the beginning it would have been a lot more understandable. I'm glad you didn't teach me this way.
"the blinking lights are the most important thing for a server to have." lol. I like this guy. Thanks for this tutorial.
Hello, I don’t mean to intrude, but might you assist me with something? In my OKX wallet, I hold USDT TRX20 and the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ]. How can I send it to Binance or Bybit?
well known fact, lights > *
:)
Explanation from a university guy is 10x precise and clearer than some random Software developer. Kudos for a great video.
Hello, I hate to interrupt, but might you lend a hand? USDT TRX20 and my recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ] are in my OKX wallet How do I move it to Binance or Bybit?
If "explain it to me like I'm 5" was a person. Thank you so much Rob.
Hey, sorry to disrupt you, but could you assist me? USDT TRX20 is stored in my OKX wallet, and I’ve saved my recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ]. How do I transfer it to Binance or Bybit?
Your explanation is quite simple and straight forward. Thanks Rob
That's the tutorial I have been searching for, thank you so much professor
Im studying for my sec + and i’m reading on ssh and I youtubed it.
Your video came up. I clicked it.
Best decision i made this morning.
Your teaching is clear, fun, and direct.
Thank you sir.
Saved me hours of running myself around in circles, I appreciate this immeasurably
Wooow! What an explanation! So we’ll explained at a concept level. Much appreciated
This is the most awesome explanation of ssh I've never seen. Thank you for the quality content sir!
2022: This is the best simple explanation ever about SSH.
Thank you so much!!!
Save this video at any cost........was stuck on this since hours but now got a clarity just by watching this video💯
I came here trying to figure out what would happen to an 'ssh' 'no password' connection in a network load balance environment. I needed some foundational stuff explained simply and quickly and got exactly what I was looking for. I wish I had professors like this when I was taking classes. Easy to understand, awesome reverse writing so he is always facing the classroom and a thrown in quote from 'Hackers'. 5/5 stars.
I have been doing this for years and for some reason, this description helps all my issues omg! Thank you for sharing
This was super simplified and an excellent explanation. Thank you.
Cool way of explaining.. Rob, I like your style.
Wow. Supreme handwriting skill i must say .
I hate to spoil it for you but...
It's just a flipped camera so the backwards text appears forward.
@@Fidelity_Investments Still Handwriting is Handwriting.
Very impressed by your ability to write backwards.
It's a screen that invert the writings for us to see.
@@ayamEdwinI believe he writes in a glass and just mirroring the video.
@claytonkruse your believe system doesn't change the truth 🤭😂
Hey, I need some assistance-could you help me out? In my OKX wallet, I have USDT TRX20 and the recovery phrase [ clean party soccer advance audit clean evil finish tonight involve whip action ]. How do I send it to Binance or Bybit?
Amazing explanation of how SSH keys works, thanks!
This is perfectly explained and I now understand the shh connection process. Thank you Sir.
Your explanation was perfect for me. Thanks Rob!
Love your simple and clear explanation and visuals. Thanks.
It is a great video. Very well explained. Thank you Rob.
finally, someone who can explain - thanks, prof
Easy to understand and quite informative, thank you for the effort.
Great explanaton, finally filled in the blanks for me.
You are the best. Mr. ROB
Excellent explanation. Helped me a lot. Thank you!
Great Video, brilliant explanation.Thank you
Great explanation ! I was really confused about aws pem file part
really cool, good explanation and easy to hear
Such a valuable information. That's really amazing.
This is the video that made it click, thanks!
Thanks a lot for the clear and easy explanation of 'ssh'. I have a question: Does the 'public key' generated by the 'server' relies on the 'private key' kept on the private computer/laptop? Thanks
Edit: My query got answered at 6:30 Thanks
This is such a great lesson. Thank you so much!
The professor's explanation mixes up key concepts. In SSH authentication, the server sends a random challenge, your client signs it with the private key, and the server verifies the signature with the public key. No encryption/decryption happens-it's about signing and verifying, not "decrypting" the challenge.
Perfect explanation! Thank you!
Thanks, this is an excellent explainer.
This was well explained. Thank you sir
Extremlly amazing explanation
Great explained ssh concept
Loved the part of blinking lights.
Me gusto mucho xD
how the hell you write backwards? it's better than my penmanship writing normally!!
I thought the same hahah
how are all super chill. like they see it everyday. for me its no less than magic.
He just flipped the video horizontally hahaha
@@boradagdelen3846 🫢😆
Video is taken from his side
thank you so much for this valuable video
Superb concise presentation
The color of the blinking lights provide current status of the server.
This video was very helpful thank you
Windows now has a built-in SSH client, and you can also install and launch an SSH server on your Windows machine if you want. It uses Open SSH.
Excellent explanation, thanks!
Wonderful explaination. Pls answer this query if possible related to this topic..
We download the 'private key' over the internet from AWS. Dsnt it makes the private key insecure as it was not on our laptop in the 1st place !!?? And got downloaded from AWS externally.
Happy 4th Anniversary!
thx sir! your explanation is very good
thanks much for the explanation
Awesome explanation
No need for Putty in Windows, you can "Add / Remove Features" from Settings / Control Panel and add OpenSSH (11MB), then you can access all ssh commands from terminal.
How established SSH connection translates to a particular user on server?
Could you please explain how you write in reverse ? I came to learn ssh keys but took out a paper and started writing the way he is writing.... Couldn't do it though..... It took a lot of efforts ..... Congo on that
The video is mirrored.
Great work man!
Great info!
Thank you!
Thanks for the forecast! Could you help me with something unrelated: My okx wallet holds some USDT, and I have the seed phrase: (tag suit turtle raccoon orange fever main skull special hungry crystal mixture). What's the way to send them to Binance?
Thank you so much!!! So nice.
Amazing explanation thanks!!!!
I have worked with computers for over 40 years, and I can confirm the computer with more blinking lights is the more important and powerful. Watch any movies from the 60s and see the computers have a wall of flashing lights, i.e. Lost in Space
"The blinking lights are the most importat thing for any server to have" 🤣
Now, if someone were eavesdropping on the link and picked up both the encrypted stream and decrypted one, could they somehow back out the private key from that? I assume no.
What an Explanation.
Great video!
That means encryption done with public key can only be decrypted using equivalent private key.Right?
Yessss
Machine 1: Client
Machine 2: Server
1. Generate SSH key pair on your client machine.
2. Add your public key to the server machine.
3. Now while connecting to the server our machine will request the server for connection and the rest will happen.
So if there a millions users they create 1 million pub pri keys
this guy can write in mid air.
Thank you for a clear explanation.
Thank you, great explenation
question when i generate keys on linux it generates a private and public am i supposed to copy the private key to the computer i want to ssh from?
i think ive buggerd my linux os and cigwin up ive generated multiple keys in diffrent directorys to try to get it to work
the closest i get is ssh user@
> password:
the connection was rejected (key,password )
what am i doing wrong?
Totally off topic, but I’ve always wondered how this drawing board overlay works. He seems to be writing on a physical surface, as I even hear the squeaks of the markers. It looks like the drawing surface is between him and the camera. And I assume he hasn’t learned to draw and write backwards just to use this tool. So I assume he’s writing normally. But if that were the case, I’d see the image reversed. But it looks normal. It’s a cool magic trick. I don’t think he’s recording this twice and then compositing the two videos with the drawing surface reversed. Somehow, he’s facing the camera, drawing on a surface between himself and the camera, which appears to be transparent, and yet the image on the surface is being reversed in real time.
If anyone knows the secret and ever reads this on this 5 year old video, I would appreciate the info! Thanks. 😊
Why again do you not think that he simply flipped the whole video horizontally? I think that's what he did.
Thank you!
Wait, are you typing backwards so we see it right?
Did not get jt.. So if there are 100 users do we need 100 pairs of pub pri keys
So you said that the public key can be shared with anyone, even with a suspicious website and that would cause no harm. But if MITM attack happens and the attacker has our public key, wouldn't that mean he might be able to fool the user into ssh'ing into some proxy and steal data?
Thats where certificates comes to play via verifications from respective certificate authority.
"if you're using linux then i've no doubt you already know exactly how to do this " lol
…accurate.
how is he writing inverted??
tyvm
thanks sir.
you can encrypt a key like 'bob' by spelling it backwards
You can write letter reversely?! Awesome
How do we get the private key????
you generate the key pair with ssh-keygen
HOW are you writing backwards?????
You’re so funny bro 😂😂😂😂
thanks
this man writes in reverse!!!!
Gold
gutes video
Pretty sure windows comes with ssh as a terminal command nowadays B)
It's funny how putty is supposed to be the gatekeeper of security but it's website (at least when this was recorded) isn't using tsl and is very unsafe lol no matter, these days you don't even need putty. Just ssh straight from terminal (no need for putty or wsl), heck ssh from 10 panes from one terminal lol
Thank Dr
65fr - 2km
m^2=n2-n1
Wait is he writing backwards . sorry couldn't help myself
Is he really writing in a mirrored manner??
tbh you've made this overcomplicated as you've not initially provided the context, most people associate the server end with a web server, not a server you're connecting to... You them made it more confusing by using Amazon Web services. 🙃 i.e. really didn't lay out the context well. It would have been much less confusing by using a web server with the private key, signed by a CA then using the public key on the client as that generally the standard use case..If you'd have explained the context the beginning it would have been a lot more understandable. I'm glad you didn't teach me this way.
thank u smart jonny sins
"The blinking lights are the most important thing for any server to have"
ua-cam.com/video/dPAw4opzN9g/v-deo.html
Moore John Gonzalez Linda Anderson Sandra