{"version":"1.0","provider_name":"AFRIK Management","provider_url":"https:\/\/afrikmanagement.com","author_name":"admin","author_url":"https:\/\/afrikmanagement.com\/index.php\/author\/wxrmg2xuqd\/","title":"SSH : qu'est-ce que c'est ? - AFRIK Management","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"M3PGqTWD7S\"><a href=\"https:\/\/afrikmanagement.com\/index.php\/2024\/07\/04\/7546\/\">SSH : qu&#8217;est-ce que c&#8217;est ?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/afrikmanagement.com\/index.php\/2024\/07\/04\/7546\/embed\/#?secret=M3PGqTWD7S\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0SSH : qu&#8217;est-ce que c&#8217;est ?\u00a0\u00bb &#8212; AFRIK Management\" data-secret=\"M3PGqTWD7S\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/afrikmanagement.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/afrikmanagement.com\/wp-content\/uploads\/2024\/07\/B39.jpg","thumbnail_width":1024,"thumbnail_height":682,"description":"Le\u00a0Secure Shell, couramment d\u00e9sign\u00e9 par l&#8217;acronyme SSH, est un protocole de r\u00e9seau cryptographique utilis\u00e9 pour assurer des communications s\u00e9curis\u00e9es sur un r\u00e9seau non s\u00e9curis\u00e9. Mis au point pour rem\u00e9dier aux vuln\u00e9rabilit\u00e9s du protocole\u00a0Telnet, SSH offre une m\u00e9thode s\u00fbre d&#8217;acc\u00e8s \u00e0 des dispositifs distants et de transfert de donn\u00e9es confidentielles. Les fondements techniques de SSH Le principal objectif de SSH est d&#8217;\u00e9tablir des connexions s\u00e9curis\u00e9es \u00e0 travers un r\u00e9seau non fiable, souvent Internet. Pour y parvenir, il utilise des techniques de cryptage robustes pour\u00a0prot\u00e9ger les donn\u00e9es\u00a0transitant entre le client et le serveur. De plus, SSH propose des m\u00e9canismes d&#8217;authentification\u00a0forte, emp\u00eachant l&#8217;acc\u00e8s [&hellip;]"}