Home Page

Firewalls

Email & Spam

Security Terminology

Security Topics

VPN & Cryptography

Wireless

 

 

Security Terminology

Password Attacks

SSH

WinSCP and Putty

 

 

Security Products Guide

Which Anti-Virus Software?

Which Firewall?

Which Spam Filter?

Which Internet Security Suite?

 

What is Guide

What is a Firewall?

What is a Virus?

What is Spam?

 

Essential Security Guides

Securing Windows XP Guide

Securing Windows Vista Guide

A Guide to Wireless Security

 

Other

Top 8 Internet Security tips

Why both, Firewall and Anti Virus?

Free or purchased security - Which one?

 

 

SSH and Putty Tutorial Guide

 

 

SSH and Putty

SSH is used for secure remote login. It is an application layer protocol and has the ability to transfer files securely as well. To provide strong security SSH uses encryption, authentication and integrity.

All security appliances today such as firewalls, email and web products support the use of SSH. SSH is commonly used by vendors to login to customer appliances at customer site in order to make configuration changes, or troubleshoot problems.

You can see SSH as the secure replacement to Telnet and also FTP when using the SCP portion of SSH. The problem with both Telnet and FTP are, both use clear text and do not provide any authenticity.

Putty is a free open source client application commonly used to connect to SSH servers such as firewalls and other appliances. You can download Putty for free and use it for other purposes as well.

SSH and Putty image