13,420
edits
Changes
no edit summary
In this lab, you will learn how to use '''ssh''', '''scp''', '''sftp''' commands to securely access and share data between authorized personnel. In addition, you will learn various methods of running and configuring an ssh server which include: using '''Public Key Authentication''', setting up an '''SSH tunnel''' in order to securely run graphical applications safely among computers in the network, '''disabling root login''', and '''changing the default ssh communication port''' to mislead potential penetration testers (also known as "pen-testers" or "hackers").
<li>Remember that you can view the '''/etc/services''' file in case you need to reference a service with a corresponding port number.</li>
</ol>
{|width="40%" align="right" cellpadding="10"