How SSH Really Works

preview_player
Показать описание

Animation tools: Adobe Illustrator and After Effects.

Checkout our bestselling System Design Interview books:

ABOUT US:
Covering topics and trends in large-scale system design, from the authors of the best-selling System Design Interview series.
Рекомендации по теме
Комментарии
Автор

Thank you for not using that stupid AI voice that channels starting to use recently.. great job!

migovas
Автор

Sahn, you guys are nearly there: 1 MILLION subscribers! 🎉
Thanks for all your helpful videos and posts! 😎✌️

gus
Автор

Dude, you do some excellent videos! Thank you!

jim
Автор

Your product gets better with every release

Juanmonseau
Автор

Awesome summary! Can you please make a video on diffie-helman (elliptic curve) encryption schemes?

edgarn
Автор

Was server identity verification (eg. the infamous fingerprint prompt) skipped in the explanation or did I just miss it? Without it, the DH alone is susceptible to MitM attack.

jarno.elonen
Автор

A step was skipped where the client verifies or presents the host key fingerprint to the user. Without certificates and a CA, host key fingerprint verification is manual, but necessary step.

ericwadebrown
Автор

Sir, Could you please create a video on computer networking?

s.p.sanjay
Автор

ssh -vv and you can see the whole process in painful detail

ethanmye-rs
Автор

Hi. Small doubt.... During key verification when the client sends the decrypted data.... Isn't it susceptible to mitm attack? Maybe I am missing something

narutokunn
Автор

Imagine paying 200K in college just to find out that resources like these are out there for free...

LGtheCat
Автор

sorry mate, how can I make schemes like that?

gius
Автор

Chat GPT is far better. The video maker seems to love more of making nice uis than explaining even doing a slight deep dive.

gulshankumar-uhoy