Please wait while we load your page...

PasswordSentry

Latest Version [8.00202205221] Last Updated [May-22-2022]

Home




SSH



Secure Shell, or SSH, is a cryptographic (encrypted) network protocol for initiating text-based shell sessions on remote machines in a secure way.

This allows a user to run commands on a machine's command prompt without them being physically present near the machine. It also allows a user to establish a secure channel over an insecure network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.

The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it can also be used in a similar fashion on Windows.

SSH was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet.

A common SSH client app is SecureCRT.

Random Security Blog Articles



PasswordSentry :: Security Blog ArticleFor cybersecurity, your best bet is to assume that the enemy has already slipped inside. clu/DigitalVision Vectors via Getty Images Scott Shackelford, Indiana University President Joe Biden’s cybersecurity executive order, signed May 12, 2021, calls for the federal … Read More
PasswordSentry :: Security Blog ArticleHackers can disrupt local government services, like this library in Willmar, Texas. The town suffered a cyberattack in August 2019. AP Photo/Tony Gutierrez Richard Forno, University of Maryland, Baltimore County President Joe Biden on March 21, 2022, warned that … Read More
PasswordSentry :: Security Blog ArticleYou may be able to protect your tangible property with security guards, CCTV surveillance and electric fences, but what about protecting your domain name? If you thought that domain names don’t need protection, then you are mistaken. Every domain name … Read More