I think the trick is actually to encrypt the message using a random key then send it once. The random key is then encrypted with the two private keys and sent back and forth as shown in the video. That way you don't have to send the whole message four times, just the decryption key.
In case anyone was wondering I was trying to figure out what the lock in this analogy is. The lock is the public key. If the neighbor for example has your lock in his "trustred" list, he will use his key (private key) to unlock his lock and vice versa.
I love this guys, I first watched his videos in 2011 while in South Sudan, Africa, and here I see him again sitting in MN, US, you are a legend bro. I am subscribing right away!!!
My favourite feature about ssh is the "Network error: Connection timeout" when i try connecting to my rpi remotely and the information about the solution which can be found on the internet
Omg but you litteraly made me understand everything I didn't understand for like the past 2weeks in school in 5min and your not even talking in my language! 😂😂 I honestly never click a subcribe button that fast! Thank you so much!
Next steps/ideas: 1) Set up SSH keys so you don't have to log in every time 2) Set up a bash alias with the ssh command to connect to your favorite device quicker 3) Learn to use scp 3.5) Get frustrated that you have to write this extremely long command remembering usernames hosts and ports just to copy a file 4) Discover .ssh/config and change your life by making scp way easier and not needing to remember aliases anymore Looking forward to your tunneling vid :)
Hey, Thank you for posting this. My hobbies are only computer adjacent, and I took on a learning project to build a Minecraft server for my friends and I, and wanted to make it secure as possible. The way I decided to set it up talked about using SSH, and this video both broke it down for smooth understanding, demonstrated where and how things may look in my OS, and gave me more resources. Thank you again.
My favourite thing to do with SSH is setup password-less logins using keys and then running rsync over cron as a very powerful yet incredibly simple automated backup system that has a bazillion different options. Rsync alone needs it's own video. Get on it tinkernut! Great vid. Love the channel.
For iOS, I use Terminus. The VNCviewer also works on iOS. As well as Fing to find devices on the network, namely the one(s) you need to SSH/VNC into. All on the App Store, as expected.
This is why SSH enabled routers are great if they're protected properly when exposed to the net. Usually you would have to do all of this on the fly, but if your router allows Remote management via SSH you can use it to tunnel into your network and reach any machine on the LAN. Also having a router that runs firmware like openwrt or dd-wrt always include utils-linux or an extended version of Busybox which is a ++ if your router supports network attached storage. Even though SSH is encrypted it is a better idea to use tunnels , even locally because each tunnel enables an extra layer of encryption on your connection, the more tunnels the slower the connection because it has to encrypt the data over X amount of times. Although this a great visual representation and explanation of ssh , ports , and tunneling, could have done without the boats though lol.
It is possible to run a SSH server on iOS. You just need to jailbreak it first. Then you go into your packagemanager, search for openSSH, and hit install
Hello, I have a question: which IP would I use, if I connect from a completely different address, for example from home to work? Would I use my public IP?
Here's a rosetta stone for the Windows users: Linux/Unix ls = Windows dir man = help mkdir = mkdir (yep, it's the same) cd = cd (yep, same with folders and ..) cp = copy touch = no idea (not sure if such exists) mv = move mv (renaming a file) = rename rm = del rmdir = rmdir (yep, same again) nano = edit (only on 32bit Windows, though; 64bit has no alternative by default)
Wow. That explanation with 2 locks. I was today years old when I understood how it actually works.
I think the trick is actually to encrypt the message using a random key then send it once. The random key is then encrypted with the two private keys and sent back and forth as shown in the video. That way you don't have to send the whole message four times, just the decryption key.
@@dkk9819 shsmsgksbsmisvsmsivsnssj
Sbsmsbssmbss smsjsbs.smsbs.sksbs.el
@@wandanisalittlegirl144 AHE80? IFOJPK!
same holy shit lol
No joke, fantastic analogy
“Even though the briefcase can be intercepted, it remains locked”
LockPickingLawyer: “Click out of 1...”
I swear there's a rule that every time you mention nano, you have to mention vim because otherwise you'll get beaten up and spat on.
In case anyone was wondering I was trying to figure out what the lock in this analogy is. The lock is the public key. If the neighbor for example has your lock in his "trustred" list, he will use his key (private key) to unlock his lock and vice versa.
Best explanation and best analogy
Thanks
Dude this was perfectly explained. Good job.
Honestly! ^^^
I love this guys, I first watched his videos in 2011 while in South Sudan, Africa, and here I see him again sitting in MN, US, you are a legend bro. I am subscribing right away!!!
Noice
Man!!!!!!! Perfectly explained the SSH!!!!!! . I've been teaching bootcamps for years, but this just made my day!!!!!
As non englihs speaker i have difficulty understand other channels video this video is really spot on, very clear and understandable
The most underrated channel. You truly deserve 10 mill subs by now!!
My favourite feature about ssh is the "Network error: Connection timeout" when i try connecting to my rpi remotely and the information about the solution which can be found on the internet
Thank you!!! I finally understood how the encriptation works!!! The explanation with the 2 locks was EXCELLENT!
Omg but you litteraly made me understand everything I didn't understand for like the past 2weeks in school in 5min and your not even talking in my language! 😂😂 I honestly never click a subcribe button that fast! Thank you so much!
I wish all programming courses were that much fun, please keep it up
brilliant video. Cuts through the BS that I have read on other sites and goes straight to it in a very comical way. Love it.
1:45 holy cow, brilliant.. Tinkernut for President
You do realize that he is not the one that came up with it. right?
@@rathernotsaynoneofyoubuiss2611 🤣🤣
love your teaching style, very funny and explained very well with visual aids. Great job!
Don’t usually comment on videos but gotta give you your props. This was a great demonstration 🙌🏿
This was a FANTASTIC ssh breakdown. The briefcase analogy was superb!
Next steps/ideas:
1) Set up SSH keys so you don't have to log in every time
2) Set up a bash alias with the ssh command to connect to your favorite device quicker
3) Learn to use scp
3.5) Get frustrated that you have to write this extremely long command remembering usernames hosts and ports just to copy a file
4) Discover .ssh/config and change your life by making scp way easier and not needing to remember aliases anymore
Looking forward to your tunneling vid :)
very helpful and clear for newbies man, thanks you mush
Hey, Thank you for posting this. My hobbies are only computer adjacent, and I took on a learning project to build a Minecraft server for my friends and I, and wanted to make it secure as possible. The way I decided to set it up talked about using SSH, and this video both broke it down for smooth understanding, demonstrated where and how things may look in my OS, and gave me more resources. Thank you again.
I'm just starting a Minecraft server and it's slow going cause I have no idea what I'm doing! How did yours turn out? Any tips?
@@aglerfamily Unfortunately life got busy and I had to shelve that project. Best of luck with yours!
Super awesome animation and explanation of SSH! Thanks, Tinkernut!
Awesome vid, and that explanation about the locks that Ankur mentioned: exactly right. Makes total sense now.
This explanation was awesome, I will immediatly go and try this out. Keep up the good content, you've just earned a subscriber!
I was in my Google IT cert course and I needed abetter understanding on this. Thank you my guy!!!
So we are from same company!!
although slightly childish, your content is probably the most informative and easily understandable stuff there is
The locked briefcase did it for me. Thank you
1:30 it was today years old when I finally learned this. everyone keeps saying it's secured.... but why? thanks
I love your enthusiasm !
I totally love the analogy using the briefcase with 2 locks!
This is the best explanation I have had for SSH ever
Your explanation/animation ending around 2 minutes was awesome!
Man great start. you should do full stack of server side technologies breakdown. SSH, SMB, FTP/SFTP, Web servers, Crons etc:
OMG! Perfectly understood the basics of SSHhhhhhh.......
My favourite thing to do with SSH is setup password-less logins using keys and then running rsync over cron as a very powerful yet incredibly simple automated backup system that has a bazillion different options. Rsync alone needs it's own video. Get on it tinkernut!
Great vid. Love the channel.
No, the next one should be how to setup SSH key's.
Many vendor scammed me I gat no time to list their name but imma tell you to go for @Darkcard00 on telegram, he help me few hour ago 💯✅
@@angieamanda2455 “gat no time” lol bot
Love how you explained this!
For iOS, I use Terminus. The VNCviewer also works on iOS. As well as Fing to find devices on the network, namely the one(s) you need to SSH/VNC into. All on the App Store, as expected.
That lock example was just perfect.
This briefcase encrypting strategy is just genuis.😮😮
Best explanation I've heard for how VPN security works.
hears nano
>brandishes pitchfork
hears vim
>calms down.
This channel deserves a million subscribers!!
You can remove non-empty directories with rm -R
It also works for normal files and empty direktories
I’m a big fan of this production great video man thank you
This is why SSH enabled routers are great if they're protected properly when exposed to the net. Usually you would have to do all of this on the fly, but if your router allows Remote management via SSH you can use it to tunnel into your network and reach any machine on the LAN. Also having a router that runs firmware like openwrt or dd-wrt always include utils-linux or an extended version of Busybox which is a ++ if your router supports network attached storage. Even though SSH is encrypted it is a better idea to use tunnels , even locally because each tunnel enables an extra layer of encryption on your connection, the more tunnels the slower the connection because it has to encrypt the data over X amount of times. Although this a great visual representation and explanation of ssh , ports , and tunneling, could have done without the boats though lol.
I can just say Wowwww.. what a nice explanation in just 6 min.great man keep it up .Thanks for this,
Thank you so much i was having trouble understanding ssh but you just made me understand in 10min
Yes this explained shared key encryption perfectly
Omg! You are awsome on explaining stuff! I`m so gratefull that I found your channel
The infographic is excellent and easy to understand. Tinkernut is a bro.
On iOS use iSH...it’s basically Linux command line and I use it for programming on my iPad :)
I would say my fav thing about ssh is being able to set up a clip board file to copy code and links back and fourth for different uses.
Love the IT crowd reference. Good to see another video from you my man
These last two videos have been upping your game, sir.
best tutorial so far
Oh ma gaw! You still alive
STUDIOCRAFTapps he’s been alive for the past year
Luke I just realized that UA-cam has failed to show ANY of his video for the past year. I’m really serious
I learned so much in this video. Thank you so much!
thanks a lot man :D 👍
You just gained a subscriber sir!
It is possible to run a SSH server on iOS. You just need to jailbreak it first. Then you go into your packagemanager, search for openSSH, and hit install
Good explanation. Please, make more example of when and how to use ssh. Just writing terminal commands is not enough.
Head-ache cleared by the 'lock animation' . Thanks...even though its very basic, other places make it too complicated to understand this basic stuff.
Best Explanation on the Internet! Thanks!
Best video explanation about this SSHt
thanks for remarkable explanation
I'm born in 1996, thanks for introducing me to Gilligan's island, seems to be better than Lost
absolutely crushed it
0:23 SSH==SSSSSSHHHHHH! pal u got what it needs to b on UA-cam ........Humour
Excellent video! Make SSH very easy to understand. Thanks
What’s the password when you typed admin
good analogy in the beginning. but dont get where the server fits in. Is it the briefcase
stay hott .. thanks for ssh double lock animation explanation !! 💙
great explanation. Thanks man
Thanks for this video!
This was helpful. thank you.
Bro this was a great video!!!
Thanks for a great video.
Amazing video. Enjoyed
nicest explanation ! thanks man
golden nugget video
Next video should be:
Use GIT on Two computers on same account using gitlab
i have never used rmdir, rm -r or rm -rf or slap a sudo in front of it depending on it's permissions
Very helpful tutorial
Amazing explanation. Thank you!
Thank you for this video, its really simple but effective.
Thanks for the unique anology.
Many thanks
amazing work on the editing!
great explanation! thanks :D
Wow. Thank you!
You saved my time by these info. Thanks a lot.
i can not find ssh service only in task manager also cant find the manage button its not there
haha...that IT-Crowd easteregg though :D
Authentic Programmer, natural light supply for the room has been minimized
10/10
Thanks for sharing
Excellent!
Hello, I have a question: which IP would I use, if I connect from a completely different address, for example from home to work? Would I use my public IP?
Just find your videos but subscribed straight away. Will come back
I don't know why but this video makes me satisfied.....may be due to editing❤
Here's a rosetta stone for the Windows users:
Linux/Unix ls = Windows dir
man = help
mkdir = mkdir (yep, it's the same)
cd = cd (yep, same with folders and ..)
cp = copy
touch = no idea (not sure if such exists)
mv = move
mv (renaming a file) = rename
rm = del
rmdir = rmdir (yep, same again)
nano = edit (only on 32bit Windows, though; 64bit has no alternative by default)