SSH Keys
Вставка
- Опубліковано 24 сер 2018
- Dr. Rob Edwards from San Diego State University describes how to create and use ssh keys. This version has more of a focus on using the Amazon Web Services keys for accessing those servers.
For more information about SSH keys check out the manual: linsalrob.github.io/Computati...
"the blinking lights are the most important thing for a server to have." lol. I like this guy. Thanks for this tutorial.
Explanation from a university guy is 10x precise and clearer than some random Software developer. Kudos for a great video.
If "explain it to me like I'm 5" was a person. Thank you so much Rob.
Your explanation is quite simple and straight forward. Thanks Rob
Love your simple and clear explanation and visuals. Thanks.
This is the most awesome explanation of ssh I've never seen. Thank you for the quality content sir!
That's the tutorial I have been searching for, thank you so much professor
Im studying for my sec + and i’m reading on ssh and I youtubed it.
Your video came up. I clicked it.
Best decision i made this morning.
Your teaching is clear, fun, and direct.
Thank you sir.
Wow. Supreme handwriting skill i must say .
I hate to spoil it for you but...
It's just a flipped camera so the backwards text appears forward.
Saved me hours of running myself around in circles, I appreciate this immeasurably
Wooow! What an explanation! So we’ll explained at a concept level. Much appreciated
Your explanation was perfect for me. Thanks Rob!
This is perfectly explained and I now understand the shh connection process. Thank you Sir.
2022: This is the best simple explanation ever about SSH.
Thank you so much!!!
This was well explained. Thank you sir
Thank you for a clear explanation.
Amazing explanation of how SSH keys works, thanks!
Easy to understand and quite informative, thank you for the effort.
Very impressed by your ability to write backwards.
This is the video that made it click, thanks!
This is such a great lesson. Thank you so much!
Great info!
Thank you!
Excellent explanation. Helped me a lot. Thank you!
Thank you! Very well explained and easy to understand! 💛
Such a valuable information. That's really amazing.
really cool, good explanation and easy to hear
Great Video, brilliant explanation.Thank you
Great explanation ! I was really confused about aws pem file part
Superb concise presentation
Great explained ssh concept
thx sir! your explanation is very good
finally, someone who can explain - thanks, prof
Extremlly amazing explanation
This video was very helpful thank you
Excellent explanation, thanks!
You are the best. Mr. ROB
Amazing explanation thanks!!!!
thanks much for the explanation
Awesome explanation
thank you so much for this valuable video
Great explanaton, finally filled in the blanks for me.
Great work man!
how the hell you write backwards? it's better than my penmanship writing normally!!
I thought the same hahah
how are all super chill. like they see it everyday. for me its no less than magic.
He just flipped the video horizontally hahaha
@@boradagdelen3846 🫢😆
Video is taken from his side
Thanks a lot for the clear and easy explanation of 'ssh'. I have a question: Does the 'public key' generated by the 'server' relies on the 'private key' kept on the private computer/laptop? Thanks
Edit: My query got answered at 6:30 Thanks
Thank you, great explenation
Thank you so much!!! So nice.
Great video!
Thank you!
"The blinking lights are the most importat thing for any server to have" 🤣
Thank Dr
Happy 4th Anniversary!
Wonderful explaination. Pls answer this query if possible related to this topic..
We download the 'private key' over the internet from AWS. Dsnt it makes the private key insecure as it was not on our laptop in the 1st place !!?? And got downloaded from AWS externally.
Windows now has a built-in SSH client, and you can also install and launch an SSH server on your Windows machine if you want. It uses Open SSH.
What an Explanation.
Totally off topic, but I’ve always wondered how this drawing board overlay works. He seems to be writing on a physical surface, as I even hear the squeaks of the markers. It looks like the drawing surface is between him and the camera. And I assume he hasn’t learned to draw and write backwards just to use this tool. So I assume he’s writing normally. But if that were the case, I’d see the image reversed. But it looks normal. It’s a cool magic trick. I don’t think he’s recording this twice and then compositing the two videos with the drawing surface reversed. Somehow, he’s facing the camera, drawing on a surface between himself and the camera, which appears to be transparent, and yet the image on the surface is being reversed in real time.
If anyone knows the secret and ever reads this on this 5 year old video, I would appreciate the info! Thanks. 😊
this guy can write in mid air.
How established SSH connection translates to a particular user on server?
thanks
Gold
I have worked with computers for over 40 years, and I can confirm the computer with more blinking lights is the more important and powerful. Watch any movies from the 60s and see the computers have a wall of flashing lights, i.e. Lost in Space
question when i generate keys on linux it generates a private and public am i supposed to copy the private key to the computer i want to ssh from?
i think ive buggerd my linux os and cigwin up ive generated multiple keys in diffrent directorys to try to get it to work
the closest i get is ssh user@
> password:
the connection was rejected (key,password )
what am i doing wrong?
gutes video
That means encryption done with public key can only be decrypted using equivalent private key.Right?
You can write letter reversely?! Awesome
You’re so funny bro 😂😂😂😂
Could you please explain how you write in reverse ? I came to learn ssh keys but took out a paper and started writing the way he is writing.... Couldn't do it though..... It took a lot of efforts ..... Congo on that
The video is mirrored.
Wait, are you typing backwards so we see it right?
how is he writing inverted??
65fr - 2km
How do we get the private key????
you generate the key pair with ssh-keygen
So you said that the public key can be shared with anyone, even with a suspicious website and that would cause no harm. But if MITM attack happens and the attacker has our public key, wouldn't that mean he might be able to fool the user into ssh'ing into some proxy and steal data?
Thats where certificates comes to play via verifications from respective certificate authority.
"if you're using linux then i've no doubt you already know exactly how to do this " lol
thank u smart jonny sins
1.19
m^2=n2-n1
"The blinking lights are the most important thing for any server to have"
ua-cam.com/video/dPAw4opzN9g/v-deo.html
Is he really writing in a mirrored manner??
tbh you've made this overcomplicated as you've not initially provided the context, most people associate the server end with a web server, not a server you're connecting to... You them made it more confusing by using Amazon Web services. 🙃 i.e. really didn't lay out the context well. It would have been much less confusing by using a web server with the private key, signed by a CA then using the public key on the client as that generally the standard use case..If you'd have explained the context the beginning it would have been a lot more understandable. I'm glad you didn't teach me this way.
Wait is he writing backwards . sorry couldn't help myself
that squeaky noise of the whiteboard markers is soo annoying, I had to stop watching, sorry
hi , can i contact you pls ?