First page Back Continue Last page Summary Graphic
Application Links (cont.)
Perimeter Defense
- Secure Shell - A replacement for the insecure r-commands, for telnet and for ftp. Unlike telnet, which sends information (including passwords) in clear text, which can be easily picked off of the wire by a sniffer. SSH encrypts all traffic between two hosts using strong cryptography, including passwords.
- SSH-1 http://www.cs.hut.fi/ssh
- Do not use RSAREF with ssh-1.2.27. It has a buffer overflow exploit.
- SSH-2 http://www.ssh.fi
- OpenSSH http://www.openssh.net
Notes: