SSH Keys
ฝัง
- เผยแพร่เมื่อ 24 ส.ค. 2018
- Dr. Rob Edwards from San Diego State University describes how to create and use ssh keys. This version has more of a focus on using the Amazon Web Services keys for accessing those servers.
For more information about SSH keys check out the manual: linsalrob.github.io/Computati...
"the blinking lights are the most important thing for a server to have." lol. I like this guy. Thanks for this tutorial.
Explanation from a university guy is 10x precise and clearer than some random Software developer. Kudos for a great video.
If "explain it to me like I'm 5" was a person. Thank you so much Rob.
That's the tutorial I have been searching for, thank you so much professor
Your explanation is quite simple and straight forward. Thanks Rob
Love your simple and clear explanation and visuals. Thanks.
Wooow! What an explanation! So we’ll explained at a concept level. Much appreciated
Your explanation was perfect for me. Thanks Rob!
Im studying for my sec + and i’m reading on ssh and I youtubed it.
Your video came up. I clicked it.
Best decision i made this morning.
Your teaching is clear, fun, and direct.
Thank you sir.
This is the most awesome explanation of ssh I've never seen. Thank you for the quality content sir!
This is perfectly explained and I now understand the shh connection process. Thank you Sir.
Saved me hours of running myself around in circles, I appreciate this immeasurably
Wow. Supreme handwriting skill i must say .
I hate to spoil it for you but...
It's just a flipped camera so the backwards text appears forward.
Easy to understand and quite informative, thank you for the effort.
Amazing explanation of how SSH keys works, thanks!
This is such a great lesson. Thank you so much!
2022: This is the best simple explanation ever about SSH.
Thank you so much!!!
Excellent explanation. Helped me a lot. Thank you!
This was well explained. Thank you sir
Thank you for a clear explanation.
Such a valuable information. That's really amazing.
Thank you! Very well explained and easy to understand! 💛
Very impressed by your ability to write backwards.
really cool, good explanation and easy to hear
Great explanation ! I was really confused about aws pem file part
Great info!
Thank you!
Great Video, brilliant explanation.Thank you
Superb concise presentation
Great explained ssh concept
Extremlly amazing explanation
thx sir! your explanation is very good
Excellent explanation, thanks!
Amazing explanation thanks!!!!
thanks much for the explanation
Awesome explanation
This is the video that made it click, thanks!
thank you so much for this valuable video
how the hell you write backwards? it's better than my penmanship writing normally!!
I thought the same hahah
how are all super chill. like they see it everyday. for me its no less than magic.
He just flipped the video horizontally hahaha
@@boradagdelen3846 🫢😆
Video is taken from his side
This video was very helpful thank you
Thanks a lot for the clear and easy explanation of 'ssh'. I have a question: Does the 'public key' generated by the 'server' relies on the 'private key' kept on the private computer/laptop? Thanks
Edit: My query got answered at 6:30 Thanks
You are the best. Mr. ROB
finally, someone who can explain - thanks, prof
Thank you, great explenation
Great explanaton, finally filled in the blanks for me.
Great work man!
Windows now has a built-in SSH client, and you can also install and launch an SSH server on your Windows machine if you want. It uses Open SSH.
Thank you so much!!! So nice.
Totally off topic, but I’ve always wondered how this drawing board overlay works. He seems to be writing on a physical surface, as I even hear the squeaks of the markers. It looks like the drawing surface is between him and the camera. And I assume he hasn’t learned to draw and write backwards just to use this tool. So I assume he’s writing normally. But if that were the case, I’d see the image reversed. But it looks normal. It’s a cool magic trick. I don’t think he’s recording this twice and then compositing the two videos with the drawing surface reversed. Somehow, he’s facing the camera, drawing on a surface between himself and the camera, which appears to be transparent, and yet the image on the surface is being reversed in real time.
If anyone knows the secret and ever reads this on this 5 year old video, I would appreciate the info! Thanks. 😊
Great video!
Thank you!
Wonderful explaination. Pls answer this query if possible related to this topic..
We download the 'private key' over the internet from AWS. Dsnt it makes the private key insecure as it was not on our laptop in the 1st place !!?? And got downloaded from AWS externally.
Thank Dr
Happy 4th Anniversary!
"The blinking lights are the most importat thing for any server to have" 🤣
What an Explanation.
this guy can write in mid air.
How established SSH connection translates to a particular user on server?
thanks
Gold
question when i generate keys on linux it generates a private and public am i supposed to copy the private key to the computer i want to ssh from?
i think ive buggerd my linux os and cigwin up ive generated multiple keys in diffrent directorys to try to get it to work
the closest i get is ssh user@
> password:
the connection was rejected (key,password )
what am i doing wrong?
That means encryption done with public key can only be decrypted using equivalent private key.Right?
I have worked with computers for over 40 years, and I can confirm the computer with more blinking lights is the more important and powerful. Watch any movies from the 60s and see the computers have a wall of flashing lights, i.e. Lost in Space
Could you please explain how you write in reverse ? I came to learn ssh keys but took out a paper and started writing the way he is writing.... Couldn't do it though..... It took a lot of efforts ..... Congo on that
The video is mirrored.
gutes video
You can write letter reversely?! Awesome
Wait, are you typing backwards so we see it right?
You’re so funny bro 😂😂😂😂
how is he writing inverted??
So you said that the public key can be shared with anyone, even with a suspicious website and that would cause no harm. But if MITM attack happens and the attacker has our public key, wouldn't that mean he might be able to fool the user into ssh'ing into some proxy and steal data?
Thats where certificates comes to play via verifications from respective certificate authority.
How do we get the private key????
you generate the key pair with ssh-keygen
65fr - 2km
"The blinking lights are the most important thing for any server to have"
th-cam.com/video/dPAw4opzN9g/w-d-xo.html
"if you're using linux then i've no doubt you already know exactly how to do this " lol
1.19
m^2=n2-n1
thank u smart jonny sins
Is he really writing in a mirrored manner??
tbh you've made this overcomplicated as you've not initially provided the context, most people associate the server end with a web server, not a server you're connecting to... You them made it more confusing by using Amazon Web services. 🙃 i.e. really didn't lay out the context well. It would have been much less confusing by using a web server with the private key, signed by a CA then using the public key on the client as that generally the standard use case..If you'd have explained the context the beginning it would have been a lot more understandable. I'm glad you didn't teach me this way.
Wait is he writing backwards . sorry couldn't help myself
that squeaky noise of the whiteboard markers is soo annoying, I had to stop watching, sorry
hi , can i contact you pls ?