Home Page


Email & Spam

Security Terminology

Security Topics

VPN & Cryptography




Security Terminology

Password Attacks


WinSCP and Putty



Security Products Guide

Which Anti-Virus Software?

Which Firewall?

Which Spam Filter?

Which Internet Security Suite?


What is Guide

What is a Firewall?

What is a Virus?

What is Spam?


Essential Security Guides

Securing Windows XP Guide

Securing Windows Vista Guide

A Guide to Wireless Security



Top 8 Internet Security tips

Why both, Firewall and Anti Virus?

Free or purchased security - Which one?



SSH and Putty Tutorial Guide



SSH and Putty

SSH is used for secure remote login. It is an application layer protocol and has the ability to transfer files securely as well. To provide strong security SSH uses encryption, authentication and integrity.

All security appliances today such as firewalls, email and web products support the use of SSH. SSH is commonly used by vendors to login to customer appliances at customer site in order to make configuration changes, or troubleshoot problems.

You can see SSH as the secure replacement to Telnet and also FTP when using the SCP portion of SSH. The problem with both Telnet and FTP are, both use clear text and do not provide any authenticity.

Putty is a free open source client application commonly used to connect to SSH servers such as firewalls and other appliances. You can download Putty for free and use it for other purposes as well.

SSH and Putty image