When I was a kid, I loved a song by Jay Chou termed Only you can hear. I remember the bland and uninspired story in the MV about a couple of young lovers. The story about the meeting, falling in love, disagreements, arguments, and separations has little to do with my life of the time. While that was the story I understood as a child - the importance of communication in intimate relationships. So much so that I wanna steal the song title.
She told me she was following the real-time result of the 2020 U.S. presidential election.
SSH is a network protocol for encrypted logins between computers.In 1995, the Finnish academic Tatu Ylonen designed the SSH protocol, which became a fundamental solution for Internet security. This article is my notes on configuring SSH logins and summarizes the common uses of SSH.
There are roughly three ways to use SSH to log in to a remote Linux server: password, key, and certificate. This post will focus on how to use these three methods of SSH login to remote Linux and will not go through the SSH principles or the underlying protocols. Furthermore, this article only discusses Linux and macOS-based SSH usage. If you want to use ssh in windows, you need third-party software support.