Information Security Leader, Author, Instructor and Speaker

An Introduction to SSH2

Posted on February 9, 2005 in Articles | by

Secure Shell (SSH) provides a secure means of connecting computers over an inherently insecure medium. One of the most common uses of SSH is to facilitate remote login sessions between an authorized user and a trusted host over the Internet. With the release of SSH2, users have the benefit of added functionality and security. When comparing SSH2 to SSH1, it’s important to note that SSH2 is not simply SSH1 with new protocols plugged in. It’s a complete rewrite of the original protocol and has now incorporated built-in protections against a number of known vulnerabilities in SSH1.

Read the full article: An introduction to SSH2

Published in SearchSecurity on 02/09/05

TAGS: ,

Leave a Reply

Your email address will not be published. Required fields are marked *