-
Notifications
You must be signed in to change notification settings - Fork 0
Web Developer Roadmap
Secure shell is a protocol.
Client (localhost) communicates with remote pc (remote host).
SSH client: Putty
, windows 10 native one.
ssh {user}@{host}
user: account to be accessed.
host: computer to be accesses, it can be an ip, domain name, etc.
Free server: Digital Ocean
Ever wonder how hosting websites like Hostgator or Bluehost or GoDaddy work? Well, using your Digital Ocean Server, you can set one up yourself very easily. All you need is to ssh into your server and set up your droplet to serve websites. This is completely optional but if you would like to create your own website server, then you can follow along this tutorial to see how everything works underneath the hood. Not bad is it?
Check it here free credit ere.
Same key for encryption and decryption in both parties. Key Exchange Algorithm. Each session has its own ssh key.
Public - private key pair. Public keys are exchanged between parties and private keys are kept secret. Public keys are used to send encrypted messages and private keys are used to decrypt them. For instance, computer A has keys puA (public key) and prA (private key) and computer B has puB and prB. Computer a wants to send message to B. Both of them request data so that they can generate the public key of each other with the Difiile Hellman Key Exchange algorithm. Once generated, all the messages sent from A to B will be encrypted with the public key from B Difiie Hellman Key Exchange allows that the public key from another party is generated locally from data received instead of transferring the public key itself.
Gitflow