Factbites
 Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: SSH


Related Topics
IRC
FTP

  
  Secure Shell - Wikipedia, the free encyclopedia
In computing, Secure Shell or SSH is both a computer program and an associated network protocol designed for logging into and executing commands on a networked computer.
SSH has a clean internal architecture with well-separated layers.
The SSH client requests a server-side port to be forwarded using a global request.
en.wikipedia.org /wiki/Secure_shell   (1471 words)

  
 What is SSH? - A Word Definition From the Webopedia Computer Dictionary
Developed by SSH Communications Security Ltd., Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another.
When using ssh's slogin (instead of rlogin) the entire login session, including transmission of password, is encrypted; therefore it is almost impossible for an outsider to collect passwords.
SSH is available for Windows, Unix, Macintosh, and OS/2, and it also works with RSA authentication.
www.webopedia.com /TERM/S/SSH.html   (274 words)

  
 Basics- ssh
The ssh clients and servers exchange "host keys", which are uniquely generated and should be impossible to forge because they use public-key cryptography to for authentication.
My ssh server generates a different public/private key pair each time this happens, so if you tried to connect the day after I changed my hardware, your ssh client would complain (and the fix would be to remove aplawrence.com from ~/.ssh/known-hosts and make a "new" connection).
Once you have created an ssh identity (which is just a pair of public/private keys), an attempt to access a server that knows your public key (this is YOUR public key now, nothing to do with the host keys) no longer asks you for your password.
aplawrence.com /Security/ssh.html   (2564 words)

  
 Linux.ie :: Using SSH   (Site not responding. Last check: 2007-11-07)
SSH (Secure Shell) first and foremost is a secure replacement for the r* programs (rlogin, rsh, rcp, rexec).
The ssh package comes with a script called make-ssh-known-hosts which looks up all the hosts in a DNS domain and adds their host keys to the /etc/ssh_known_hosts file which is also checked by ssh.
Another item worthy of note (though it's under a proprietary license) is Mindterm which is a ssh suite written in java which includes the ability to provide a local ftp proxy to a remote sftp server (no more plain text ftp logins).
www.linux.ie /articles/tutorials/ssh.php   (1150 words)

  
 Suso Technology Services Inc. -- Web Hosting, E-mail Hosting, Dedicated Servers, Colocation, Web Design and Web ...
SSH was designed and created to provide for the best security when accessing another computer remotely.
SSH is *very* strict about the permissions that you have on your remote.ssh directory and the files underneath.
Most of the problems you will have with SSH are due to the permissions that you have on the files on the remote side.
www.suso.org /linux/tutorials/ssh.phtml   (1346 words)

  
 SSH via a Web Browser
The difference between SSH and those other programs is that they are clear text protocols where as SSH encrypts everything it sends across the network.
SSH has the added benefit of being able to "tunnel" other protocols.
A tunnel is basically an opening on both the local and remote machines, passing along the SSH connection, that allows other protocols (examples: X, FTP, SMTP and POP3) to piggy back along the SSH line, encrypting the data all the way.
www.ece.osu.edu /computing/ssh_www.html   (1011 words)

  
 Free SSH and SCP for Windows 9x, NT, ME, 2000 and XP
SSH is a protocol that uses public key cryptography to transfer data securely over insecure networks.
"ssh" and "scp" are "secure" versions of the UNIX "rsh" and "rcp" commands, (which in turn are a bit like the more familiar "telnet" and "ftp" programs).
Both programs use the SSH protocol to establish a secure connection and to encrypt all data passing between the client and the server.
www.jfitz.com /tips/ssh_for_windows.html#Known_Hosts   (3274 words)

  
 Using ssh LG #61
From the manual page of ssh we can learn that: "Ssh (Secure Shell) is a program for logging into a remote machine and executing commands in a remote machine.
At present time there are two SSH protocol, referred as SSH2 and SSH1, the first one being an improvement of the SSH1 protocol.
When a ssh connection is started from a user whom public key matches one of the entry of authorization file the public key authentication scheme starts.
www.linuxgazette.com /issue61/dellomodarme.html   (1057 words)

  
 O'Reilly Network: SSH on Mac OS X for Worry-Free Wireless
SSH Secure Shell is a protocol for secure remote logins.
It uses SSH for data transfer, and uses the same authentication by asking for passwords or phrases.
Using SSH to create a pipe so you can access the camera's webserver from the outside is even better since you can scan around the room.
www.oreillynet.com /pub/a/wireless/2001/11/20/secure_webcam.html   (3159 words)

  
 OpenSSH FAQ
SSH 2.3 and earlier versions contain a flaw in their HMAC implementation.
The idea is that the user connects to the remote host using ssh, and specifies which port on the client's machine should be used to forward connections to the remote server.
However, use of this option causes ssh to wait around for ever (as opposed to exiting after a remote command has completed), and the user must take care to manually kill(1) the process afterwards.
www.openssh.com /faq.html   (4462 words)

  
 Installing, configuring, and operating the secure shell (SSH) on systems running Solarix 2.x   (Site not responding. Last check: 2007-11-07)
The SSH suite of security enhancing tools addresses the problem of host and user authentication by using strong public key cryptography, and the problem of clear text data transmission by using strong data encryption.
SSH can be built and installed on many UNIX systems.
The SSH News Group - The news group comp.security.ssh is available at http://www.deja.com/=liszt/dnquery.xp?query=-g%20comp.security.ssh.
www.cert.org /security-improvement/implementations/i062_01.html   (2921 words)

  
 ssh-howto   (Site not responding. Last check: 2007-11-07)
SSH protects the user from illicit network snooping ("packet sniffing"), whereby un-encrypted passwords and text can be read by unscrupulous persons.
SSH serves a purpose that is similar to Kerberos, but it works consistently amongst different operating systems and is easier to administer (no ticket- server is required, sysadmin privileges are not required to set it up).
SSH can provide a stronger encryption algorithm ("RSA") and it can allow X11 and other network protocols to securely "tunnel" through your encrypted SSH session as they pass over the net.
www.csua.berkeley.edu /ssh-howto.html   (1621 words)

  
 [No title]   (Site not responding. Last check: 2007-11-07)
Introduction SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another.
The data (the whole encrypted data stream) is first encrypted with the first cipher, then decrypted with the second cipher, and finally encrypted with the third cipher.
The security of SSH against man-in-the-middle attacks and the secu- rity of the new form of.rhosts authentication, as well as server host validation, depends on the integrity of the host key and the files containing known host keys.
www.free.lp.se /fish/rfc.txt   (10873 words)

  
 CvsGui
I set-up ssh to connect without a password to my cvs server "cvs.3d.com" (it uses my private key, and the public key is on the server in ~/.ssh/authorized_keys).
The idea is to have ssh forwarding the pserver port on the client to the firewall, then from the firewall to the server.
If this is your first time to connect to the firewall with SSH, a dialog box will pop up asking if you want to add an entry for this server.
www.wincvs.org /ssh.html   (1283 words)

  
 Hacking Linux Exposed   (Site not responding. Last check: 2007-11-07)
SSH Tunneling may be the tool for you.
Alice claimed that she was able to securely access her email over POP[1] even though the server didn't support any encryption such as POP over SSL.
Since this connection was tunnelled inside the existing SSH session, it is completely[4] encrypted, with almost no work on your part, requiring no knowledge of cryptographic algorithms whatsoever.
www.hackinglinuxexposed.com /articles/20030228.html   (899 words)

  
 SSH : Products : SSH Tectia Solution   (Site not responding. Last check: 2007-11-07)
SSH Tectia enables secure system administration, secure file transfer and secure application connectivity with centralized management throughout the internal and external network.
SSH Tectia provides transparent strong encryption and authentication and easily integrates into heterogeneous, multi-platform environments.
SSH Tectia Manager is a unique management and operations module for operating secure services in a corporate infrastructure.
www.ssh.fi /products/tectia   (296 words)

  
 GeodSoft How-To: SSH Beginners Guide: Contents
Eventually I learned that SSH is enabled by default on OpenBSD (and many recent Linuxs) provided that I did not make certain other configuration changes which had become virtually standard, before trying SSH.
Since I was familiar with telnet and FTP and not SSH and had only telnet and FTP clients on my Windows workstation, most systems set up before mid 2001 used these services.
The way that I learned of the relationship between ssh and hosts.allow, which I had previously only associated with TCP Wrappers, was via EnGarde Secure Linux, www.engardelinux.com.
geodsoft.com /howto/ssh   (1071 words)

  
 Secure Shell (SSH)   (Site not responding. Last check: 2007-11-07)
SSH is a secure replacements for telnet, ftp, rsh, and rcp.
All communication using SSH is encrypted using strong, modern ciphers and protocols.
SSH Applications for your PC You can get ssh applications for virtually any operating system.
www.jtan.com /resources/ssh.html   (300 words)

  
 Stopdesign | Secure wireless email on Mac OS X
SSH tunnels need to be created each time you join a new network, and before you start passing any data back and forth.
SSH is only being used to secure your wireless communications from an untrusted wireless network where your traffic could be sniffed to a “secure” network that you yourself trust.
Here’s a very good article on SSH and keys, which is a bit more thorough than the MacDevCenter article, and a tutorial on using ssh-agent, which is a simple commandline “keychain” that’ll stop you being prompted for your passphrase every time you SSH to a host, and it’s standard on most *NIXes.
www.stopdesign.com /log/2005/02/07/secure-email.html   (8897 words)

  
 ONLamp.com: Cryptosystems: Configuring SSH
Since SSH is composed of a client and a server, there are two configuration files.
The very first time I changed an SSH configuration file, I mistakenly added a server line to the client configuration file and scratched my head in puzzlement when it had no effect on my system.
Remember to keep in mind that the SSH client is where you are sitting, and the SSH server is the machine you want to access remotely.
www.onlamp.com /pub/a/bsd/2002/11/28/FreeBSD_Basics.html   (1017 words)

  
 Ssh basics   (Site not responding. Last check: 2007-11-07)
Ssh (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another.
In other words, ssh never trusts the net; somebody hostile who has taken over the network can only force ssh to disconnect, but cannot decrypted or play back the traffic, or hijack the connection.
Ssh does have an option to use encryption of type "none" this is only for debugging purposes, and should not be used.
www.rz.uni-karlsruhe.de /~ig25/ssh-faq/ssh-faq-2.html   (564 words)

  
 Windows NT Utilities   (Site not responding. Last check: 2007-11-07)
I've done a port of ssh and scp to Windows 95 and NT.
SSH is the Secure Shell, and it basically lets you do secure logins to Unix machines.
It allows you to run commands such as ssh remote_machine -l chaffee ls, and it even lets you log into other machines interactively, but it gives you only dumb terminal capabilities.
bmrc.berkeley.edu /people/chaffee/winntutil.html   (746 words)

  
 Ssh basics   (Site not responding. Last check: 2007-11-07)
With ssh, you can create secure remote X sessions which are transparent to the user.
Ssh even protects against a spoofer on the local network, who can pretend he is your router to the outside.
Ssh will not help you with anything that compromises your host's security in some other way.
www.dreamwvr.com /ssh-faq/ssh-faq-2.html   (564 words)

  
 Secure Shell - a Whatis.com definition - see also: SSH, Secure Socket Shell   (Site not responding. Last check: 2007-11-07)
Secure Shell (SSH), sometimes known as Secure Socket Shell, is a Unix-based command interface and protocol for securely getting access to a remote computer.
SSH is actually a suite of three utilities - slogin, ssh, and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp.
SSH uses RSA public key cryptography for both connection and authentication.
searchsecurity.techtarget.com /sDefinition/0,,sid14_gci214091,00.html   (204 words)

  
 Getting started with SSH - Kimmo Suominen
X Window System you can use this capability to start a terminal window to start an interactive session on the remote system.
NiftyTelnet SSH is a free ssh terminal client for MacOS.
SSH Communications Security offers commercial implementations of ssh.
kimmo.suominen.com /docs/ssh   (2076 words)

  
 The SSH Protocol   (Site not responding. Last check: 2007-11-07)
It defines an SSH user authentication method which uses a specified GSSAPI mechanism to authenticate a user, and a family of SSH key exchange methods which use GSSAPI to authenticate the Diffie-Hellman exchange described in [SSH-TRANSPORT].
This document describes a general purpose authentication method for the SSH protocol, suitable for interactive authentications where the authentication data should be entered via a keyboard.
The major goal of this method is to allow the SSH client to support a whole class of authentication mechanism(s) without knowing the specifics of the actual authentication mechanism(s).
www.snailbook.com /protocols.html   (489 words)

  
 Basic Use of SSH
SSH relies on the knowledge of a slight amount of data stored by the user.
SSH is based on RSA-encryption, and like all public-key systems, the user needs both a public and private key to use the system; as well, SSH needs a random number generator seed, which is user-specific.
The same should be done for all accounts from which the user would like to use SSH.
www.xcf.berkeley.edu /help-sessions/using-ssh/c99.html   (232 words)

  
 O'Reilly Network: Using SSH Tunneling
Until someone finds a cheap way to build a quantum computer (and perhaps a cold fusion cell to power it) this is generally considered a waste of time.
An SSH tunnel works like this: Rather than connecting to the mail server directly, we establish an SSH connection to the internal network that the mail server lives in (frequently, the mail server itself).
Your SSH client software sets up a port forwarding mechanism, so that traffic that goes to your laptop's POP port magically gets forwarded over the encrypted tunnel and ends up at the mail server's POP port.
www.oreillynet.com /pub/a/wireless/2001/02/23/wep.html   (1276 words)

Try your search on: Qwika (all wikis)

Factbites
  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.