Categories

SSH

Daniel Morales April 24, 2016
No votes yet.
Please wait...

SSH (Secure Socket Shell) is a network protocol that provides administrators with a secure way to access a remote computer.

Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels.

SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker, who has managed to take over a network, can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled:

glossary_SSH

When using ssh login, the entire login session, including transmission of password, is encrypted, therefore it is almost impossible for an outsider to find out the passwords.

SSH is available for Windows, Unix, Macintosh, and OS/2, and it also works with RSAauthentication.

Bookmark the permalink.

Submit a ticket

If you are still unable to find a sufficient tutorial regarding your issue please use the following link to submit a request to our technical support team. We'll provide you with our help and assistance within next 24 hours: Submit a ticket

Comments are closed.