[go: up one dir, main page]

Rubini, 1997 - Google Patents

Take Command: ssh: Secure Shell

Rubini, 1997

Document ID
4477962535063067794
Author
Rubini A
Publication year
Publication venue
Linux Journal

External Links

Snippet

The ssh program suite is an interesting way to establish a secure communication channel between hosts across the Internet. It replaces a few usual communication channels (such as telnet, rlogin, rsh and rcp) and provides equivalent functionality via a new secure protocol …
Continue reading at dl.acm.org (other versions)

Similar Documents

Publication Publication Date Title
US10693916B2 (en) Restrictions on use of a key
Samar Unified login with pluggable authentication modules (PAM)
US8332464B2 (en) System and method for remote network access
Cox et al. Security in plan 9
WO2006031723A2 (en) Method and system for license management
WO2007139944A2 (en) Policy driven, credential delegation for single sign on and secure access to network resources
Snyder et al. Pro PHP security
Rubini Take Command: ssh: Secure Shell
Snow et al. Simple authentication
Vincenzetti et al. STEL: Secure TELnet.
Lafayette et al. Monitoring hpc systems against compromised ssh
CN119628897A (en) SSH identity authentication method and system supporting universal extensible password devices
Kaminsky et al. REX: Secure, modular remote execution through file descriptor passing
Harpes et al. SSH Inside Out
Chapter Securing Connections and Remote Administration
Lin Unifying heterogeneous networks with Kerberos Authentication Server and multithread implementation of Kerberized FTP for Windows 95/NT
KR20010001717A (en) Secure distributed object based applications development platform and service method thereof
Petrov et al. Secure Client Tier for the Accelerator Control System
Cox et al. 11th Annual USENIX Security Symposium &# 151; Technical Paper
Tolliver et al. Use of SSH on a compartmented mode workstation
Papamichail et al. TOWARDS FAULT TOLERANT VERIFICATION OF PROXY OBJECTS IN JINI
Papamichail et al. Towards an alternative way of verifying proxy objects in Jini
Bathanaih Network management and security for Unix