SSH, The Secure Shell: The Definitive Guide, 2nd Edition
by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes
Conventions Used in This Book
The following typographical conventions are used in this book:
Constant widthFor configuration files, things that can be found in configuration files (such as keywords and configuration file options), source code, and interactive terminal sessions.
Constant width italicFor replaceable parameters on command lines or within configuration files.
- Italic
For filenames, URLs, hostnames, command names, command-line options, and new terms where they are defined.
- AK
In figures, the object labeled A has been secured using a cryptographic key labeled K. “Secured” means encrypted, signed, or some more complex relationship, depending on the context. If A is secured using multiple keys (say, K and L), they are listed in the subscript, separated by commas: A K, L.
Tip
This icon indicates a tip, suggestion, or general note.
Warning
This icon indicates a warning or caution.