Reaction score: 146
Yeah, as a beginner it's probably best to start with a high quality tutorial that goes through all the steps. Luckily FreeBSD is Unix so many guides for all kinds of other Unix-OSes work with minor or no changes.Don't worry about it. I'm almost 20 years further than you and I'm still learning new things.
There's typically only a few options you need know for 90% of the time. Nobody knows all options and what they do from the top of their head. That's what man pages are for.
It's the other way around.Eventhough scp and ssh were replaced by rcp and rsh
Only on equipment that should have been decommissioned a long time ago. Cisco has supported SSH for quite some time now.you can not use any of them in a cisco router for example.
Yes ty it was the other way, already edited and corrected.It's the other way around.
Only on equipment that should have been decommissioned a long time ago. Cisco has supported SSH for quite some time now.
Secure Shell (SSH) is a protocol which provides a secure remote access connection to network devices. Communication between the client and server is encrypted in both SSH version 1 and SSH version 2. Implement SSH version 2 when possible because it uses a more enhanced security encryption algorithm.www.cisco.com
For example, how do you add a trusted key in all cisco devices to directly execute and receive a command? Unless they have changed something the past couple of years, you can't do it without extra apps.
Oh they finally fixed it thank you!!! Still, so much trouble and CPU overhead for nothing in a secured network.
Of course and they have. I am well aware of that "inside" danger story. There are quite a few other examples also of very trustworthy people as I am sure you know already. This is actually the majority of them. So basicaly what you say by "they're already there" is "trust no one"? Of course and they are not here. If we open such a discution though, it will no longer be a network convertation but rather a philosophical and humanitarian one.A lot of high profile hacks have been done by insiders. You have a lot more to fear from your own employees. They don't need to find a way inside, they're already there.