Originally Published: Friday, 14 July 2000 Author: Alexander Reelsen
Published to: news_enhance_security/Security News Page: 1/1 - [Printable]

SSH Tutorial

Enter SSH (Secure SHell). By using SSH, you encrypt the traffic and you can make 'man-in-the-middle' attacks almost impossible. It also protects you from DNS and IP spoofing. As a bonus, it offers the possibility to compress the traffic and thus make transfers faster. SSH is a very versatile tool: not only does it replace telnet, you can also 'tunnel' services like ftp, pop and even ppp via it.