Skip to content
Snippets Groups Projects
Unverified Commit 5f1c5c41 authored by Todor Kondic's avatar Todor Kondic
Browse files

Add slides/ssh_intro_2.md

parent a2fd147b
No related branches found
No related tags found
2 merge requests!72Regular merge of develop,!69Linux course
# Accessing Computers over Network (Securely)
* ... programs have bugs
<!-- .element: class="fragment" -->
* Bugs in communicating program enable [backdoors][1] and other [exploits][2]
<!-- .element: class="fragment" -->
* A computer on a public networks with ports unprotected is a recipe for disaster
<!-- .element: class="fragment" -->
* Which is why a computer from a previous point is never exposed to public
... unless it's a [honeypot][3]
<!-- .element: class="fragment" -->
<!-- .element: class="fragment" -->
[1]: https://www.techrepublic.com/article/is-the-intel-management-engine-a-backdoor/
[2]: https://en.wikipedia.org/wiki/Heartbleed
[3]: https://en.wikipedia.org/wiki/Honeypot_(computing)
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment