In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
In the daily operation and maintenance work, now we generally use remote connection tools to remotely operate the server, after all, we usually use the Windows system! Some people may say: alas, isn't it dangerous to connect to the Linux operating system through windows's remote tools? will it be leaked when passing data?
The answer is yes. But smart humans have developed such a tool called Xshell, which is still free! This tool uses SSH asymmetric encryption protocol, which is much more secure than telnet symmetric encryption.
Let's explain what asymmetric encryption is:
The above picture transmits data through asymmetric encryption.
Suppose that the small head wants to send a file to the big head, as shown in the figure above:
First of all, the small head has its own password, and the big head has its own password, and they generate the public key and the private key respectively. Here we can use the public key as the lock and the private key as the key. For the sake of security, the small head must not disclose its password to the big head, so the big head needs to open the file by itself.
The small head said to the big head: if you want me to pass you the file, bring your lock (public key). Then the small head hangs its own lock and the big head's lock on the file at the same time, and then passes the file to the big head, which uses its own private key (key) to open its own public key to extract data. If the small head wants to see the data himself, he will open his own public key with his own private key, which is asymmetric encryption.
Haha, isn't it very simple?
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un