Information about the SSH mailing list can be found at. For general information on SSH, see the SSH Home Page. ![]() The versions implemented at LEPP do not use Kerberos, although some recent versions include this as an option. SSH is a widely-used suite of remote access programs which provides authentication (to protect your password) and encryption (to protect your data). One way to avoid this is to use an encrypted network connection as provided by SSH. The traditional methods of connecting to remote computers, telnet and ftp, require you to transmit your password in "plain text." This exposes it to anyone who intercepts your network traffic.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |