Im studying for my sec + and i’m reading on ssh and I youtubed it. Your video came up. I clicked it. Best decision i made this morning. Your teaching is clear, fun, and direct. Thank you sir.
I came here trying to figure out what would happen to an 'ssh' 'no password' connection in a network load balance environment. I needed some foundational stuff explained simply and quickly and got exactly what I was looking for. I wish I had professors like this when I was taking classes. Easy to understand, awesome reverse writing so he is always facing the classroom and a thrown in quote from 'Hackers'. 5/5 stars.
Thanks a lot for the clear and easy explanation of 'ssh'. I have a question: Does the 'public key' generated by the 'server' relies on the 'private key' kept on the private computer/laptop? Thanks Edit: My query got answered at 6:30 Thanks
Machine 1: Client Machine 2: Server 1. Generate SSH key pair on your client machine. 2. Add your public key to the server machine. 3. Now while connecting to the server our machine will request the server for connection and the rest will happen.
Wonderful explaination. Pls answer this query if possible related to this topic.. We download the 'private key' over the internet from AWS. Dsnt it makes the private key insecure as it was not on our laptop in the 1st place !!?? And got downloaded from AWS externally.
I have worked with computers for over 40 years, and I can confirm the computer with more blinking lights is the more important and powerful. Watch any movies from the 60s and see the computers have a wall of flashing lights, i.e. Lost in Space
No need for Putty in Windows, you can "Add / Remove Features" from Settings / Control Panel and add OpenSSH (11MB), then you can access all ssh commands from terminal.
question when i generate keys on linux it generates a private and public am i supposed to copy the private key to the computer i want to ssh from? i think ive buggerd my linux os and cigwin up ive generated multiple keys in diffrent directorys to try to get it to work the closest i get is ssh user@ > password: the connection was rejected (key,password ) what am i doing wrong?
Could you please explain how you write in reverse ? I came to learn ssh keys but took out a paper and started writing the way he is writing.... Couldn't do it though..... It took a lot of efforts ..... Congo on that
Totally off topic, but I’ve always wondered how this drawing board overlay works. He seems to be writing on a physical surface, as I even hear the squeaks of the markers. It looks like the drawing surface is between him and the camera. And I assume he hasn’t learned to draw and write backwards just to use this tool. So I assume he’s writing normally. But if that were the case, I’d see the image reversed. But it looks normal. It’s a cool magic trick. I don’t think he’s recording this twice and then compositing the two videos with the drawing surface reversed. Somehow, he’s facing the camera, drawing on a surface between himself and the camera, which appears to be transparent, and yet the image on the surface is being reversed in real time. If anyone knows the secret and ever reads this on this 5 year old video, I would appreciate the info! Thanks. 😊
So you said that the public key can be shared with anyone, even with a suspicious website and that would cause no harm. But if MITM attack happens and the attacker has our public key, wouldn't that mean he might be able to fool the user into ssh'ing into some proxy and steal data?
tbh you've made this overcomplicated as you've not initially provided the context, most people associate the server end with a web server, not a server you're connecting to... You them made it more confusing by using Amazon Web services. 🙃 i.e. really didn't lay out the context well. It would have been much less confusing by using a web server with the private key, signed by a CA then using the public key on the client as that generally the standard use case..If you'd have explained the context the beginning it would have been a lot more understandable. I'm glad you didn't teach me this way.
as soon as i heard that my private key must be kept a SECRET, i stopped watching any further, becuz then it is just . . . ANOTHER form of "a password", right ? Security through SECRECY . . . just does Not work 😅🤣
"the blinking lights are the most important thing for a server to have." lol. I like this guy. Thanks for this tutorial.
Explanation from a university guy is 10x precise and clearer than some random Software developer. Kudos for a great video.
If "explain it to me like I'm 5" was a person. Thank you so much Rob.
Im studying for my sec + and i’m reading on ssh and I youtubed it.
Your video came up. I clicked it.
Best decision i made this morning.
Your teaching is clear, fun, and direct.
Thank you sir.
Very impressed by your ability to write backwards.
It's a screen that invert the writings for us to see.
@@ayamEdwinI believe he writes in a glass and just mirroring the video.
@claytonkruse your believe system doesn't change the truth 🤭😂
Your explanation is quite simple and straight forward. Thanks Rob
Wow. Supreme handwriting skill i must say .
I hate to spoil it for you but...
It's just a flipped camera so the backwards text appears forward.
@@Fidelity_Investments Still Handwriting is Handwriting.
I came here trying to figure out what would happen to an 'ssh' 'no password' connection in a network load balance environment. I needed some foundational stuff explained simply and quickly and got exactly what I was looking for. I wish I had professors like this when I was taking classes. Easy to understand, awesome reverse writing so he is always facing the classroom and a thrown in quote from 'Hackers'. 5/5 stars.
Save this video at any cost........was stuck on this since hours but now got a clarity just by watching this video💯
2022: This is the best simple explanation ever about SSH.
Thank you so much!!!
Saved me hours of running myself around in circles, I appreciate this immeasurably
This is the most awesome explanation of ssh I've never seen. Thank you for the quality content sir!
I have been doing this for years and for some reason, this description helps all my issues omg! Thank you for sharing
That's the tutorial I have been searching for, thank you so much professor
Wooow! What an explanation! So we’ll explained at a concept level. Much appreciated
Cool way of explaining.. Rob, I like your style.
Amazing explanation of how SSH keys works, thanks!
This is perfectly explained and I now understand the shh connection process. Thank you Sir.
how the hell you write backwards? it's better than my penmanship writing normally!!
I thought the same hahah
how are all super chill. like they see it everyday. for me its no less than magic.
He just flipped the video horizontally hahaha
@@boradagdelen3846 🫢😆
Video is taken from his side
finally, someone who can explain - thanks, prof
Love your simple and clear explanation and visuals. Thanks.
It is a great video. Very well explained. Thank you Rob.
Your explanation was perfect for me. Thanks Rob!
Windows now has a built-in SSH client, and you can also install and launch an SSH server on your Windows machine if you want. It uses Open SSH.
Great explanation ! I was really confused about aws pem file part
Easy to understand and quite informative, thank you for the effort.
Great explanaton, finally filled in the blanks for me.
Great Video, brilliant explanation.Thank you
You are the best. Mr. ROB
"The blinking lights are the most importat thing for any server to have" 🤣
Such a valuable information. That's really amazing.
Excellent explanation. Helped me a lot. Thank you!
Thanks a lot for the clear and easy explanation of 'ssh'. I have a question: Does the 'public key' generated by the 'server' relies on the 'private key' kept on the private computer/laptop? Thanks
Edit: My query got answered at 6:30 Thanks
Extremlly amazing explanation
Machine 1: Client
Machine 2: Server
1. Generate SSH key pair on your client machine.
2. Add your public key to the server machine.
3. Now while connecting to the server our machine will request the server for connection and the rest will happen.
So if there a millions users they create 1 million pub pri keys
"if you're using linux then i've no doubt you already know exactly how to do this " lol
…accurate.
Wonderful explaination. Pls answer this query if possible related to this topic..
We download the 'private key' over the internet from AWS. Dsnt it makes the private key insecure as it was not on our laptop in the 1st place !!?? And got downloaded from AWS externally.
Perfect explanation! Thank you!
really cool, good explanation and easy to hear
This is the video that made it click, thanks!
Happy 4th Anniversary!
Loved the part of blinking lights.
Me gusto mucho xD
I have worked with computers for over 40 years, and I can confirm the computer with more blinking lights is the more important and powerful. Watch any movies from the 60s and see the computers have a wall of flashing lights, i.e. Lost in Space
How established SSH connection translates to a particular user on server?
This was well explained. Thank you sir
Great explained ssh concept
No need for Putty in Windows, you can "Add / Remove Features" from Settings / Control Panel and add OpenSSH (11MB), then you can access all ssh commands from terminal.
Superb concise presentation
thank you so much for this valuable video
Thanks, this is an excellent explainer.
this guy can write in mid air.
This is such a great lesson. Thank you so much!
This video was very helpful thank you
question when i generate keys on linux it generates a private and public am i supposed to copy the private key to the computer i want to ssh from?
i think ive buggerd my linux os and cigwin up ive generated multiple keys in diffrent directorys to try to get it to work
the closest i get is ssh user@
> password:
the connection was rejected (key,password )
what am i doing wrong?
Could you please explain how you write in reverse ? I came to learn ssh keys but took out a paper and started writing the way he is writing.... Couldn't do it though..... It took a lot of efforts ..... Congo on that
The video is mirrored.
thanks much for the explanation
Awesome explanation
Excellent explanation, thanks!
Did not get jt.. So if there are 100 users do we need 100 pairs of pub pri keys
Thank you so much!!! So nice.
That means encryption done with public key can only be decrypted using equivalent private key.Right?
Yessss
thx sir! your explanation is very good
What an Explanation.
Great info!
Thank you!
how is he writing inverted??
Totally off topic, but I’ve always wondered how this drawing board overlay works. He seems to be writing on a physical surface, as I even hear the squeaks of the markers. It looks like the drawing surface is between him and the camera. And I assume he hasn’t learned to draw and write backwards just to use this tool. So I assume he’s writing normally. But if that were the case, I’d see the image reversed. But it looks normal. It’s a cool magic trick. I don’t think he’s recording this twice and then compositing the two videos with the drawing surface reversed. Somehow, he’s facing the camera, drawing on a surface between himself and the camera, which appears to be transparent, and yet the image on the surface is being reversed in real time.
If anyone knows the secret and ever reads this on this 5 year old video, I would appreciate the info! Thanks. 😊
Great video!
Great work man!
Amazing explanation thanks!!!!
Wait, are you typing backwards so we see it right?
Thank you!
So you said that the public key can be shared with anyone, even with a suspicious website and that would cause no harm. But if MITM attack happens and the attacker has our public key, wouldn't that mean he might be able to fool the user into ssh'ing into some proxy and steal data?
Thats where certificates comes to play via verifications from respective certificate authority.
Thank you, great explenation
this man writes in reverse!!!!
How do we get the private key????
you generate the key pair with ssh-keygen
You can write letter reversely?! Awesome
Pretty sure windows comes with ssh as a terminal command nowadays B)
thanks sir.
Thank you for a clear explanation.
you can encrypt a key like 'bob' by spelling it backwards
thanks
You’re so funny bro 😂😂😂😂
Gold
gutes video
"The blinking lights are the most important thing for any server to have"
ua-cam.com/video/dPAw4opzN9g/v-deo.html
65fr - 2km
thank u smart jonny sins
m^2=n2-n1
Thank Dr
Moore John Gonzalez Linda Anderson Sandra
1.19
Wait is he writing backwards . sorry couldn't help myself
tbh you've made this overcomplicated as you've not initially provided the context, most people associate the server end with a web server, not a server you're connecting to... You them made it more confusing by using Amazon Web services. 🙃 i.e. really didn't lay out the context well. It would have been much less confusing by using a web server with the private key, signed by a CA then using the public key on the client as that generally the standard use case..If you'd have explained the context the beginning it would have been a lot more understandable. I'm glad you didn't teach me this way.
Is he really writing in a mirrored manner??
as soon as i heard that my private key must be kept a SECRET, i stopped watching any further, becuz then it is just . . . ANOTHER form of "a password", right ? Security through SECRECY . . . just does Not work 😅🤣
Not really. You don't need to memorise the SSH key, you only need to know where you saved it. You don't generate it either.
Of course you generate it
that squeaky noise of the whiteboard markers is soo annoying, I had to stop watching, sorry
hi , can i contact you pls ?
Thank you! Very well explained and easy to understand! 💛
this is so good, thank you sir