summaryrefslogtreecommitdiff
path: root/security/ssh2/pkg-descr
blob: 88c6003dc9aeaa82fd1a47eaca4d02ad1200e725 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
SSH Protocols and Secure Shell

  Secure Shell is the secure login program that revolutionized remote
management of networks hosts over the Internet.  It is a powerful,
very easy-to-use program that uses strong cryptography for protecting
all transmitted confidential data, including passwords, binary files,
and administrative commands.

  SSH Communications Security is the developer of the Secure Shell and
the SSH protocol, technologies that are the de-facto standard for
encrypted terminal connections on the Internet. The benefits of SSH
include 

o Automatic authentication of users, no passwords sent in cleartext to
  prevent the stealing of passwords.

o Multiple strong authentication methods that prevent such security
  threats as spoofing identity.

o Authentication of both ends of connection, the server and the client
  are authenticated to prevent identity spoofing, trojan horses, etc. 

o Automatic authentication using agents to enable strong
  authentication to multiple systems with a single-sign-on.

o Encryption and compression of data for security and speed.

o Secure file transfer.

o Tunneling and encryption of arbitrary connections.


WWW: http://www.ssh.fi/