当前位置:网站首页>Solution to long waiting time of SSH connection to remote host
Solution to long waiting time of SSH connection to remote host
2022-07-03 16:59:00 【Brother Xing plays with the clouds】
Recently in use SSH When connecting to the remote host, I found that I was inputting SSH After the command, it will take a long time before the prompt for entering the password appears , On other machines, the prompt for entering the password can be displayed immediately . It makes me very unhappy . Who calls me a jerk ! So I don't want to just wait , Simply find a solution . finally , Our machine can also be connected to the remote host in seconds !
The solution is as follows :
1. First find /etc/ssh/ssh_config file
2. use vim Use root Permission to open the file and edit
3. take 27 Yes #GSSAPIAuthentication no Ahead ‘#’ Get rid of .
边栏推荐
- [Jianzhi offer] 57 - ii Continuous positive sequence with sum s
- [combinatorial mathematics] recursive equation (example of recursive equation 2 Hanoi Tower | example of recursive equation 3 insertion sequencing)
- 静态程序分析(一)—— 大纲思维导图与内容介绍
- Daily code 300 lines learning notes day 10
- mysql用户管理
- Take you to API development by hand
- Assembly instance analysis -- screen display in real mode
- Network security web penetration technology
- 远程办公之如何推进跨部门项目协作 | 社区征文
- Hong Kong Polytechnic University | data efficient reinforcement learning and adaptive optimal perimeter control of network traffic dynamics
猜你喜欢

ucore概述

【Try to Hack】主动侦查隐藏技术

2022.02.14_ Daily question leetcode five hundred and forty

One brush 145 force deduction hot question-2 sum of two numbers (m)

大变局!全国房价,跌破万元大关

The word backspace key cannot delete the selected text, so you can only press Delete

線程池:業務代碼最常用也最容易犯錯的組件
![[try to hack] active detection and concealment technology](/img/43/d48f851268fec566ce0cc83bd9557e.png)
[try to hack] active detection and concealment technology
![[combinatorics] polynomial theorem (polynomial theorem | polynomial theorem proof | polynomial theorem inference 1 item number is the number of non negative integer solutions | polynomial theorem infe](/img/9d/6118b699c0d90810638f9b08d4f80a.jpg)
[combinatorics] polynomial theorem (polynomial theorem | polynomial theorem proof | polynomial theorem inference 1 item number is the number of non negative integer solutions | polynomial theorem infe

Le zèbre a été identifié comme un chien, et la cause de l'erreur d'AI a été trouvée par Stanford
随机推荐
[combinatorics] recursive equation (example 1 of recursive equation | list recursive equation)
To resist 7-Zip, list "three sins"? Netizen: "is the third key?"
visual studio “通常每个套接字地址(协议/网络地址/端口)只允许使用一次“
NLP四范式:范式一:非神经网络时代的完全监督学习(特征工程);范式二:基于神经网络的完全监督学习(架构工程);范式三:预训练,精调范式(目标工程);范式四:预训练,提示,预测范式(Prompt工程)
What is the maximum number of concurrent TCP connections for a server? 65535?
[sword finger offer] 58 - I. flip the word order
LeetCode 1657. Determine whether the two strings are close
Assembly instance analysis -- screen display in real mode
[combinatorics] recursive equation (characteristic equation and characteristic root | example of characteristic equation | root formula of monadic quadratic equation)
One brush 142 monotone stack next larger element II (m)
IDEA-配置插件
ANOVA example
One brush 148 force deduction hot question-5 longest palindrome substring (m)
Depth first search of graph
CC2530 common registers for timer 1
Yu Wenwen, Hu Xia and other stars take you to play with the party. Pipi app ignites your summer
Talk about several methods of interface optimization
BYD and great wall hybrid market "get together" again
Hands on in-depth learning notes (XIV) 3.7 Simple implementation of softmax regression
[combinatorics] non descending path problem (number of non descending paths with constraints)