Skip to content
GitLab
Menu
Projects
Groups
Snippets
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in
Toggle navigation
Menu
Open sidebar
R3
school
courses
Commits
d8dd0986
Unverified
Commit
d8dd0986
authored
Mar 24, 2020
by
Todor Kondic
Browse files
Add slides_intro_3.md
parent
5f1c5c41
Changes
1
Hide whitespace changes
Inline
Side-by-side
2020/2020-02-15_gnuLinuxCourse/slides/ssh_intro_3.md
0 → 100644
View file @
d8dd0986
# Accessing Computers over Network (Securely)
*
Normally, very few ports are open on a modern (LCSB) server
<!-- .element: class="fragment" -->
*
In addition, the communication to and from ports is typically encrypted
-
Why? Because, between the sender and a recepient there is a whole
jungle of transfer network nodes, each of which is potentially
[
p(owned)
][
1
]
by an adversary
<!-- .element: class="fragment" -->
-
For a thorough introduction, see
[
this set of EFF articles
][
2
]
<!-- .element: class="fragment" -->
-
_Transparency is a virtue of the naive_
-
remember, we're not doing politics
<!-- .element: class="fragment" -->
<!-- .element: class="fragment" -->
<!-- .element: class="fragment" -->
*
In the context of todays lecture, one type of encrypted
communication protocol will help us solve three fundamental
questions
-
How to securely log in to a server?
<!-- .element: class="fragment" -->
-
How to securely interact with a server?
<!-- .element: class="fragment" -->
-
How to securely exchange any kind (and amount) of data with a server?
<!-- .element: class="fragment" -->
<!-- .element: class="fragment" -->
[
1
]:
https://en.wikipedia.org/wiki/Zombie_(computing)
[
2
]:
https://ssd.eff.org/
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment