Lines Matching refs:machine
6 network, to execute commands in a remote machine, and to move files
7 from one machine to another. It provides strong authentication and
34 the server machine, and forwards any X11 connections over the
36 generated and forwarded to the remote machine; the local client
39 remote machine the real information).
52 o Client RSA-authenticates the server machine in the beginning of
55 RSA-authenticates the client machine before accepting .rhosts or
61 to a machine (the key obtained on the first connection will be
79 breaking into the server machine at a later time; one hour from
80 the connection even the server machine cannot decipher the session
88 store the RSA authentication keys on any machine in the network
89 (except the user's own local machine). The authentication
103 warning) if the server machine is not running sshd.
116 machine connected to the network can listen in on any communication.
145 the network (any machine on the network) can listen to anything that
245 sshd Server program run on the server machine. This
251 machine or to execute commands on the other machine.
254 scp Securely copies files from one machine to another.
276 The first form opens a new shell on the remote machine (after
278 machine.
280 When started, the ssh connects sshd on the server machine, verifies
281 that the server machine really is the machine it wanted to connect,
328 libraries would require special work for each machine, vendor and
331 same machine where the clients are run, and forwarding the connections
349 machine, and the server must have connections allowed from the local
350 machine. Using authentication data is always recommended because not
356 machine, because the connection will then not go over the secure
357 channel. The recommended way to start a shell in a remote machine is
362 machine is
366 If you need to type a password/passphrase for the remote machine,
386 server machine in the user's $HOME/.ssh/authorized_keys file. The
387 private key is only kept on the user's local machine, laptop, or other
411 name servers, or the client machine. The only thing that matters is
432 relies on the integrity of the client machine. These weaknesses is
446 and routing spoofing attacks (as long as the client machine private
449 client machine as to who is requesting to log in. This prevents
471 Basically, anyone with root access on the local machine on which you
473 access on the server machine may be able to monitor your
484 use your machine while you are away. They might also make