- Thread Starter
- #26
Don't worry about it. I'm almost 20 years further than you and I'm still learning new things.
And sharing that knowledge, for which we are all grateful for...
Don't worry about it. I'm almost 20 years further than you and I'm still learning new things.
Yeah, as a beginner it's probably best to start with a high quality tutorial that goes through all the steps. Luckily FreeBSD is Unix so many guides for all kinds of other Unix-OSes work with minor or no changes.Don't worry about it. I'm almost 20 years further than you and I'm still learning new things.
There's typically only a few options you need know for 90% of the time. Nobody knows all options and what they do from the top of their head. That's what man pages are for.
It's the other way around.Eventhough scp and ssh were replaced by rcp and rsh
Only on equipment that should have been decommissioned a long time ago. Cisco has supported SSH for quite some time now.you can not use any of them in a cisco router for example.
It's the other way around.
Only on equipment that should have been decommissioned a long time ago. Cisco has supported SSH for quite some time now.
Configure SSH on Routers and Switches
This document describes how to configure and debug Secure Shell (SSH) on Cisco routers or switches that run Cisco IOS® Software.www.cisco.com
For example, how do you add a trusted key in all cisco devices to directly execute and receive a command? Unless they have changed something the past couple of years, you can't do it without extra apps.
Oh they finally fixed it thank you!!! Still, so much trouble and CPU overhead for nothing in a secured network.SSH Public Key Authentication on Cisco IOS
This lesson explains how to configure SSH Public Key Authentication on Cisco IOS using Windows and Linux.networklessons.com
A lot of high profile hacks have been done by insiders. You have a lot more to fear from your own employees. They don't need to find a way inside, they're already there.Still, so much trouble and CPU overhead for nothing in a secured network.
Of course and they have. I am well aware of that "inside" danger story. There are quite a few other examples also of very trustworthy people as I am sure you know already. This is actually the majority of them. So basicaly what you say by "they're already there" is "trust no one"? Of course and they are not here. If we open such a discution though, it will no longer be a network convertation but rather a philosophical and humanitarian one.A lot of high profile hacks have been done by insiders. You have a lot more to fear from your own employees. They don't need to find a way inside, they're already there.