Rubini, 1997 - Google Patents
Take Command: ssh: Secure ShellRubini, 1997
- Document ID
- 4477962535063067794
- Author
- Rubini A
- Publication year
- Publication venue
- Linux Journal
External Links
Snippet
The ssh program suite is an interesting way to establish a secure communication channel between hosts across the Internet. It replaces a few usual communication channels (such as telnet, rlogin, rsh and rcp) and provides equivalent functionality via a new secure protocol …
- 238000004891 communication 0 abstract description 12
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10693916B2 (en) | Restrictions on use of a key | |
Samar | Unified login with pluggable authentication modules (PAM) | |
US8332464B2 (en) | System and method for remote network access | |
Cox et al. | Security in plan 9 | |
WO2006031723A2 (en) | Method and system for license management | |
WO2007139944A2 (en) | Policy driven, credential delegation for single sign on and secure access to network resources | |
Snyder et al. | Pro PHP security | |
Rubini | Take Command: ssh: Secure Shell | |
Snow et al. | Simple authentication | |
Vincenzetti et al. | STEL: Secure TELnet. | |
Lafayette et al. | Monitoring hpc systems against compromised ssh | |
CN119628897A (en) | SSH identity authentication method and system supporting universal extensible password devices | |
Kaminsky et al. | REX: Secure, modular remote execution through file descriptor passing | |
Harpes et al. | SSH Inside Out | |
Chapter | Securing Connections and Remote Administration | |
Lin | Unifying heterogeneous networks with Kerberos Authentication Server and multithread implementation of Kerberized FTP for Windows 95/NT | |
KR20010001717A (en) | Secure distributed object based applications development platform and service method thereof | |
Petrov et al. | Secure Client Tier for the Accelerator Control System | |
Cox et al. | 11th Annual USENIX Security Symposium &# 151; Technical Paper | |
Tolliver et al. | Use of SSH on a compartmented mode workstation | |
Papamichail et al. | TOWARDS FAULT TOLERANT VERIFICATION OF PROXY OBJECTS IN JINI | |
Papamichail et al. | Towards an alternative way of verifying proxy objects in Jini | |
Bathanaih | Network management and security for Unix |