Secure Remote Access With SSH

    Date08 May 2000
    3643
    Posted ByAnthony Pell
    The secure shell protocol (SSH) is one way to provide remote access without giving your information to anyone who might be watching. SSH provides a way to log in to another computer, like rsh or telnet, while encrypting all the . . . The secure shell protocol (SSH) is one way to provide remote access without giving your information to anyone who might be watching. SSH provides a way to log in to another computer, like rsh or telnet, while encrypting all the information that is exchanged between two computers. Be advised that SSH is not the end of the solution. SSH is a very good place to start, but it doesn't replace other security measures. Firewalls and packet filters can help prevent spoofing. Kerberos, S/Key, and other authentication systems can be used to further augment the end-to-end encryption provided by SSH.
    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"7","type":"x","order":"1","pct":87.5,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":12.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.