Using key-based authentication over SSH

Posted by dave on Mar 19, 2004 8:36 AM EDT
NewsForge
Mail this story
Print this story

SSH, or secure shell, is a protocol by which users can remotely log in, administer, or transfer files between computers using an encrypted transport mechanism. Running over every major operating system, SSH provides a more secure connection method than traditional telnet or the much-maligned "r commands" (rlogin, rcp, rsh). SSH includes provisions for key-based authentication that doesn't require a password, which opens the door for some innovative remote access applications.

Full Story

  Nav
» Read more about: Story Type: News Story

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.