![]() |
![]() |
?Advertise ?Contact ?SecurityWatch |
? Articles | Editorials | Reviews | News | InfoSec Directory | Releases | White Papers |
VoIP Articles - New to VoIP? VoIP Articles will help you understand what's important in VoIP. ![]() |
Using Keys with SSH Monday, 11 October 2004, 09:26 GMT If you've administered any remote Linux machines, then you're probably already familiar with SSH. As you may know, SSH provides secure, encrypted network communication. Utilities like ssh and sftp, which are based on SSH, protect remote login sessions and file transfers, respectively, and have largely subsumed similar but insecure and unencrypted utilities such as ftp, rlogin, rsh, rcp, and telnet. (In fact, if any of your systems still use telnet, put down this magazine at once, go disable telnet, install and enable SSH, and then continue reading.) The ssh utility is easy to use, but typing passwords again and again is a hassle, and precludes scripting remote access. This month, let's explore a better way to use SSH, using OpenSSH (http://www.openssh.org) and SSH protocol version 2. (If you're using a different SSH suite or protocol version 1, some of this month's instructions may not apply or may need to be modified to suit your version of the software.) Read More at Linux Magazine |
Tuesday, September 20, 2005 Network Security
GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available. Network Security Software - Sponsored by GFI Network Security. Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial! Wireless Security
![]() Press Releases
|
?Copyright ? 2000 - 2005 eBCVG IT Security | Affiliates :: RSS feeds :: Privacy? |
?