-rw------- 1 root root 2.1K Nov 7 18:15 authorized_keys
> > > These are the public keys from other computer systems. You can revoke access by removing the lines in the file that pertain to the remote system.
-rw------- 1 root root 1.7K Nov 7 06:01 id_rsa
> > > This key is your private key, do not share it with anyone. I'll explain why in the next file.
-rw-r--r-- 1 root root 405 Nov 7 06:01 id_rsa.pub
> > > This key is your public key. Without the private key, you cannot access servers containing your public key. Anyone that has the private key can gain access into systems with the public key setup.
-rw-r--r--. 1 root root 1.2K Nov 6 07:41 known_hosts
> > > These are your trusted connections. If an IP address changes of a remote system (For instance, let's say you've authenticated with domains and not an IP address), you will receive a warning and should proceed with caution if the IP of the domain changes. In some cases, depending on your configuration, your system will deny you connecting to the remote system if there's a mismatch.