Приклади вживання Secure shell Англійська мовою та їх переклад на Українською
{-}
-
Computer
-
Colloquial
-
Ecclesiastic
Secure Shell.
Connect to a remote computer using Secure Shell.
The Secure Shell.
ConnectBot is a powerful open-source Secure Shell(SSH) client.
Secure Shell(SSH).
SmartFTP implements the following features of the Secure Shell(SSH) protocol.
SSH, Secure Shell.
There are multiple mechanisms for transferring files using the Secure Shell protocols.
That's where Secure Shell Access(SSH) comes in.
None of my servers permit root logins andall use a different port for secure shell access.
Secure Shell(SSH) command-line connection from any computer.
Select this to use the secure shell to login to the remote host.
A secure shell(SSH) tunnel consists of an encrypted tunnel created through a SSH protocol connection.
This client allows you to connect to Secure Shell servers that typically run on UNIX-based servers.
SSH(Secure Shell) is a network protocol of seance level. It allows doing outsource management of operation system.
The participants argued that both"Secure Shell" and"SSH" were generic terms and could not be trademarks.
This open architecture provides considerable flexibility,allowing SSH to be used for a variety of purposes beyond secure shell.
It's called Secure Shell(SSH), and is in many ways similar to FTP.
What do you do if your security protocols call for a non-standard secure shell port and disabling root login?
SSH(«Secure SHell»)- network protocol for managing the data and operating system on the remote computer, execution of commands on it, also can be used for tunneling TCP-connections.
The working group participants argued that both Secure Shell SSH were generic terms and that they could not be trademarks.
This open architecture provides considerable flexibility,allowing the use of SSH for a variety of purposes beyond a secure shell.
You can use SSL certificates,add a dedicated IP as well as use Secure Shell to further secure your website.
Keeping in mind that the Pineapple is ultimately just a little Linux box with some fancy party tricks, there are times when youwill need to get your hands dirty and enter the secure shell world.
Secure Shell, often referred to as SSH, is a cryptographic network protocol to enable secure communication between networked computers, either over a local area network(LAN) or over the Internet.
When Wi-Fi is the only connectionoption, people should use HTTPS, STARTTLS, Secure Shell and other reliable protocols to encrypt Web and e-mail traffic as it passes between computers and access points.
Allows you to access another computer's files using the SEcure Shell(SSH) protocol. The remote computer needs to be running the SSH daemon, but the remainder of the protocol uses standard commandline tools as discussed below.
There are several methods to access a& CVS; repository. It may be reached via password authentication(:pserver:), secure shell(using: ext:), local repository(: local:),& etc;. The format for the repository location is(optional items appear between square brackets):.