In this article, I start by discussing the weaknesses of each of the these absolutely horrid protocols. I then introduce secure shell (ssh) and provide an in-depth guide to using it. Before some of you write this off, realize that if . . .
In this article, I start by discussing the weaknesses of each of the these absolutely horrid protocols. I then introduce secure shell (ssh) and provide an in-depth guide to using it. Before some of you write this off, realize that if you're still using passwords, you're not using ssh's strongest method of authentication. User-level public/private key authentication, somewhat similar to PGP signatures, is powerful and safe. Combine this with ssh-agent, which implements "single-signon," and you can save yourself hours a week, while remaining secure.

The link for this article located at SecurityPortal is no longer available.