Validating user calculating server
To protect you against this your ssh program checks the remote ssh server's fingerprint with the fingerprint saved from the last time it connected.
If the fingerprint has changed you will be warned and asked if you wish to continue.
Check if a number is greater than or less than another number Use the IF function to perform this comparison.
All sections should be reviewed The most common web application security weakness is the failure to properly validate input from the client or environment.
In openssh (the ssh used on most Linux systems) this fingerprint is stored in .
The fingerprint is a short version of the server's public key; it is easier for you to verify than the full key.
A big vulnerability is a man in the middle attack where some malevolent snooping entity (Mallory) between you and the remote machine intercepts all traffic, decrypts it & reencrypts before sending it on.
Mallory can do this fast enough so that you are not aware of his existance.