OpenSSH Configuration Tutorial – Kali Linux


Information Treasure

http://www.ehacking.net/2014/07/openssh-configuration-tutorial-kali.html

Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. It connects, via a secure channel over an insecure network, a server and a client running SSH server and SSH client programs, respectively. The protocol specification distinguishes between two major versions that are referred to as SSH-1 and SSH-2.

The best-known application of the protocol is for access to shell accounts on Unix-like operating systems, but it can also be used in a similar fashion for accounts on Windows. It was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis.The encryption used by SSH is intended to provide confidentiality and integrity of data over an…

View original post 1,409 more words

Thank for your comments

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

@PhilipHungCao

Stay Hungry, Stay Foolish

serializethoughts

Serializing thought objects!

pripasocamera

Pripaso,one of the most professional manufacturers in security industry.

text/plain

ericlaw talks about the web and software in general

kingpoint

Fitness, Gaming and Life endeavors

%d bloggers like this: