|
A Suggested Improvement to SSHv2
February 2000
Jonathan Herzog, The MITRE Corporation
ABSTRACT
The SSH (Secure SHell) protocol has become one of many de-facto Internet
standards for secure log-on and other network services across an insecure
connection. It is commonly used to secure connections such as
telnet or rsh, for secure le transfers (via
the scp command), as a secure tunnel for other connections such as http
or X, or as a VPN component.

Additional Search Keywords
N/A
|