当前位置:网站首页>How to view, modify, and delete SSH
How to view, modify, and delete SSH
2022-06-12 17:06:00 【Tancy.】
Linux series
This is a supplementary blog , Main article in here
see SSH
CentOS 7 and Ubuntu18.04
stay /root/.ssh Under the table of contents , Pictured 
This is configured SSH The catalog of
Four files mean authorized_keys : Store the public key of the authorized password free login host id_rsa : Private key id_ras.pub: Public key know_host: Record ssh The public key of the accessed host (public key)
Delete SSH
Directly delete all files in this directory /root/.ssh rm -rf ./*
Then reconfigure
To configure SSH operation , spot here
modify SSH
If you want to delete the access permission of a machine ( Take back the key )
You can visit authorized_keys Delete the corresponding contents of the file
边栏推荐
- \Begin{algorithm} notes
- \Begin{algorithm} notes
- rolabelImg的安装使用
- [raspberry pie]: (IV) camera advanced
- Gerrit+2触发Jenkins任务
- RMI, JNDI, LDAP introduction +log4j vulnerability analysis
- JVM内存模型与本地内存
- Making nearly $90billion, Buffett's latest heavy stock exposure
- Leetcode 2190. The number that appears most frequently in the array immediately after the key (yes, once)
- goland变成中文版了怎么修改回英文版
猜你喜欢

Installation and use of rolabelimg

Cicada mother talks to rainbow couple: 1.3 billion goods a year, from e-commerce beginners to super goods anchor

goland变成中文版了怎么修改回英文版

RMI, JNDI, LDAP introduction +log4j vulnerability analysis

写技术博客的意义

CVPR 2022 | meta learning performance in image regression task

CVPR 2022 | 元学习在图像回归任务的表现

Fiddler抓包几种常用功能介绍(停止抓包、清空会话窗内容、过滤请求、解码、设置断点......)

布局管理中的sizePolicy的策略问题

Uniapp wallpaper applet source code / double ended wechat Tiktok applet source code
随机推荐
Record the use of yolov5 to detect rotating targets
叶子分享站PHP源码下载
How to use the official documents of pytorch and torchvision
JVM memory model and local memory
MySQL authorization summary
5、Embedding
Cicada mother talks to rainbow couple: 1.3 billion goods a year, from e-commerce beginners to super goods anchor
Male god goddess voting source code v5.5.21 voting source code
5-5配置Mysql复制 基于日志点的复制
Selenium element positioning
redis.clients.jedis.exceptions.JedisDataException: NOAUTH Authentication required
su直接切换到超级管理员模式,这样很多报错都可以避免了
The R language uses the pyramid function of epidisplay package to visualize the pyramid graph and the pyramid graph based on the existing summary data (table data)
Fiddler抓包几种常用功能介绍(停止抓包、清空会话窗内容、过滤请求、解码、设置断点......)
The safety of link 01 was questioned, and "ultra high strength" became "high strength"_ Publicity_ Steel_ problem
薛定谔的日语学习小程序源码
Recommend AI intelligent drawing repair software
890. find and replace mode / Sword finger offer II 080 Combination with k elements
MySQL transaction introduction and transaction isolation level
MySQL事务简介、事务隔离级别