Lolgo.png Forum   Icon External Link IRC.png IRC   Fb-favicon.png Facebook    Twitter-favicon.png Twitter    Tumblr-favicon.gif Blog    Steampowered favicon.png Steam    Reddit-favicon.gif Reddit    Google Plus Favicon.png Google+

   8chan-favicon.png 8chan    Youtube-favicon.png YouTube    Disqus-icon.png Disqus    Pinterest-icon.png Pinterest    Tor icon onion.jpg .Onion

Portals   2015   ED in the News   Admins   Archive   Donate to ED   Donors   Advertise on ED

Anonymous VPN Service + Torrent Proxy

Free Webcams - 100% fucking free - Create a free account to chat with hundreds of girls

Sponsored by the xP// Gaming Community @ xPGaming.eu

SSH

From Encyclopedia Dramatica

Jump to: navigation, search


The inventors of the protocol
Telling his daughter to be quiet

SSH is a means of communicating securely between verified devices. It is mostly used for pedophiles to access their offshore data haven accounts to retrieve, store, and download CP. It is estimated that some 94% of internet users maintain hidden caches of incriminating evidence. SSH, and by extension SSH FTP, are trusted implicitly for the most blatantly criminal activities because it was designed by the security ninjas of the OpenBSD team.

Contents

Pronunciation

Shhhhhhhhh! As in: "Don't tell anyone about all my poorly encrypted archives"

Specification

SSH starts by comparing each other's fingerprints to known copies because as we know biometrics are hard to steal and can be easily revoked once stolen. After this, you deploy the SSH protocol in casual conversation to hide your sekkkrets like so:

 Prima: So about that drug smuggling/terrorist attack/illegal sex act we were planning...
 Secunda: SSH-1.0-DONGS
 Prima: What? Listen I really need some cash to get the weapons grade plutonium/hookers and blow.
 Secunda: SHH
 Prima: What are you not going to pay up? I'm gonna have to call Vinnie if so.
 Secunda: SHUT UP FAGGOT MY MOM IS LISTENING.

Secunda has thus successfully kept his secret sex/drugs/Jewish extremism addiction from his mother.

Vulnerabilities

As we all know, Mike Sandy can hack the matrix and has this 0day ssh crc32 exploit. Analysis of the exploit code has revealed his technique:

 Prima: So about that drug smuggling/terrorist attack/illegal sex act we were planning...
 Secunda: SSH-1.0-DONGS
 Neo: Don't worry, I'm not listening.
 Secunda: Oh okay! Prima, I've got the money and silicone niggerdongs under my bed.

Uses of SSH and Shell Accounts

  • Transferring massive amounts of child porn with wget/curl and FTP
  • Writing detailed plans to murder the President to text files
  • Following the drama and lulz from text-based Citadel systems
  • Lurking on IRC with the aid of irssi
  • Trading nuclear secrets to Iran via shell dead drops
  • Vandalizing TOW via SSH tunnels
  • Outing local gays

External Sites

  • FreeSSH - Free SSH provider
  • PuTTY, ultra shitty Windows SSH client. Don't right click.


Matrix.gif

SSH is part of a series on Programming.

Softwarez series.jpg

SSH is part of a series on

Softwarez

Visit the Softwarez Portal for complete coverage.

Personal tools
Spam ED Everywhere

If you like what we do whitelist us in adblock kthx

Anonymous VPN


Play Sparta Free!



Find us on Google+
VPN Service