Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Secure Shell

Index Secure Shell

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. [1]

117 relations: Apple Inc., Ars Technica, Authentication, Backward compatibility, BEEP, Berkeley r-commands, Berkeley Software Distribution, Broadcast domain, Campus network, Client (computing), Client–server model, Command-line interface, Communication protocol, Comparison of SSH clients, Comparison of SSH servers, Computer security, Core Security Technologies, Corkscrew (program), Cryptography, Cyclic redundancy check, Cygwin, Daemon (computing), Daniel J. Barrett, Der Spiegel, Diffie–Hellman key exchange, Digital Signature Algorithm, Dropbear (software), EdDSA, Edward Snowden, Elliptic Curve Digital Signature Algorithm, Elliptic-curve Diffie–Hellman, Encryption, Fast and Secure Protocol, File system, File Transfer Protocol, Files transferred over shell protocol, Fork (software development), Free software, FreeBSD, Freeware, FTPS, Generic Security Services Application Program Interface, GNU Multiple Precision Arithmetic Library, Helsinki University of Technology, HMAC, Host (network), Ident protocol, Integrity, International Data Encryption Algorithm, Internet, ..., Internet Engineering Task Force, Internet Standard, Kerberos (protocol), Konqueror, Linux, List of DNS record types, List of TCP and UDP port numbers, Login, Lsh, MacOS, Man-in-the-middle attack, Message authentication code, Message Passing Interface, Microsoft Windows, National Security Agency, NetBSD, Network service, NT LAN Manager, One-time password, Open-source model, Open-source software, OpenBSD, OpenSSH, OpenVMS, Operating system, Packet analyzer, Password, Plaintext, Pluggable authentication module, Port (computer networking), Port forwarding, Proprietary software, Public-key cryptography, PuTTY, Remote Shell, Request for Comments, RSA (cryptosystem), RSA SecurID, Rsync, S/KEY, Secure channel, Secure copy, SecurityFocus, Shell account, Single sign-on, SOCKS, Solaris (operating system), Spiegel Online, SSH Communications Security, SSH File Transfer Protocol, Ssh-keygen, SSHFS, Stream Control Transmission Protocol, Telnet, Transport Layer Security, Tunneling protocol, UMAC, United States Computer Emergency Readiness Team, Unix, Unix shell, Unix-like, Virtual private network, Web-based SSH, WinSCP, Working group, X Window System, X.509. Expand index (67 more) »

Apple Inc.

Apple Inc. is an American multinational technology company headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software, and online services.

New!!: Secure Shell and Apple Inc. · See more »

Ars Technica

Ars Technica (a Latin-derived term that the site translates as the "art of technology") is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998.

New!!: Secure Shell and Ars Technica · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Secure Shell and Authentication · See more »

Backward compatibility

Backward compatibility is a property of a system, product, or technology that allows for interoperability with an older legacy system, or with input designed for such a system, especially in telecommunications and computing.

New!!: Secure Shell and Backward compatibility · See more »

BEEP

The Blocks Extensible Exchange Protocol (BEEP) is a framework for creating network application protocols.

New!!: Secure Shell and BEEP · See more »

Berkeley r-commands

The Berkeley r-commands are a suite of computer programs designed to enable users of one Unix system to log in or issue commands to another Unix computer via TCP/IP computer network.

New!!: Secure Shell and Berkeley r-commands · See more »

Berkeley Software Distribution

Berkeley Software Distribution (BSD) was a Unix operating system derivative developed and distributed by the Computer Systems Research Group (CSRG) of the University of California, Berkeley, from 1977 to 1995.

New!!: Secure Shell and Berkeley Software Distribution · See more »

Broadcast domain

A broadcast domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer.

New!!: Secure Shell and Broadcast domain · See more »

Campus network

A campus network, campus area network, corporate area network or CAN is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area.

New!!: Secure Shell and Campus network · See more »

Client (computing)

A client is a piece of computer hardware or software that accesses a service made available by a server.

New!!: Secure Shell and Client (computing) · See more »

Client–server model

The client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.

New!!: Secure Shell and Client–server model · See more »

Command-line interface

A command-line interface or command language interpreter (CLI), also known as command-line user interface, console user interface and character user interface (CUI), is a means of interacting with a computer program where the user (or client) issues commands to the program in the form of successive lines of text (command lines).

New!!: Secure Shell and Command-line interface · See more »

Communication protocol

In telecommunication, a communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.

New!!: Secure Shell and Communication protocol · See more »

Comparison of SSH clients

An SSH client is a software program which uses the secure shell protocol to connect to a remote computer.

New!!: Secure Shell and Comparison of SSH clients · See more »

Comparison of SSH servers

An SSH server is a software program which uses the secure shell protocol to accept connections from remote computers.

New!!: Secure Shell and Comparison of SSH servers · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Secure Shell and Computer security · See more »

Core Security Technologies

Core Security is an American computer and network security company that provides an attack intelligence platform, vulnerability management and network penetration testing measurement software products and services.

New!!: Secure Shell and Core Security Technologies · See more »

Corkscrew (program)

Corkscrew is a program that enables the user to tunnel arbitrary TCP connections through most HTTP and HTTPS proxy servers.

New!!: Secure Shell and Corkscrew (program) · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: Secure Shell and Cryptography · See more »

Cyclic redundancy check

A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.

New!!: Secure Shell and Cyclic redundancy check · See more »

Cygwin

Cygwin is a Unix-like environment and command-line interface for Microsoft Windows.

New!!: Secure Shell and Cygwin · See more »

Daemon (computing)

In multitasking computer operating systems, a daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user.

New!!: Secure Shell and Daemon (computing) · See more »

Daniel J. Barrett

Daniel J. Barrett (born 1963) is a writer, software engineer, and musician.

New!!: Secure Shell and Daniel J. Barrett · See more »

Der Spiegel

Der Spiegel (lit. "The Mirror") is a German weekly news magazine published in Hamburg.

New!!: Secure Shell and Der Spiegel · See more »

Diffie–Hellman key exchange

Diffie–Hellman key exchange (DH)Synonyms of Diffie–Hellman key exchange include.

New!!: Secure Shell and Diffie–Hellman key exchange · See more »

Digital Signature Algorithm

The Digital Signature Algorithm (DSA) is a Federal Information Processing Standard for digital signatures.

New!!: Secure Shell and Digital Signature Algorithm · See more »

Dropbear (software)

Dropbear is a software package written by Matt Johnston that provides a Secure Shell-compatible server and client.

New!!: Secure Shell and Dropbear (software) · See more »

EdDSA

In public-key cryptography, Edwards-curve Digital Signature Algorithm (EdDSA) is a digital signature scheme using a variant of Schnorr signature based on Twisted Edwards curves.

New!!: Secure Shell and EdDSA · See more »

Edward Snowden

Edward Joseph Snowden (born June 21, 1983) is an American computer professional, former Central Intelligence Agency (CIA) employee, and former contractor for the United States government who copied and leaked classified information from the National Security Agency (NSA) in 2013 without authorization.

New!!: Secure Shell and Edward Snowden · See more »

Elliptic Curve Digital Signature Algorithm

In cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic curve cryptography.

New!!: Secure Shell and Elliptic Curve Digital Signature Algorithm · See more »

Elliptic-curve Diffie–Hellman

Elliptic-curve Diffie–Hellman (ECDH) is an anonymous key agreement protocol that allows two parties, each having an elliptic-curve public–private key pair, to establish a shared secret over an insecure channel.

New!!: Secure Shell and Elliptic-curve Diffie–Hellman · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Secure Shell and Encryption · See more »

Fast and Secure Protocol

The Fast and Secure Protocol (FASP) is a proprietary data transfer protocol.

New!!: Secure Shell and Fast and Secure Protocol · See more »

File system

In computing, a file system or filesystem controls how data is stored and retrieved.

New!!: Secure Shell and File system · See more »

File Transfer Protocol

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.

New!!: Secure Shell and File Transfer Protocol · See more »

Files transferred over shell protocol

Files transferred over Shell protocol (FISH) is a network protocol that uses Secure Shell (SSH) or Remote Shell (RSH) to transfer files between computers and manage remote files.

New!!: Secure Shell and Files transferred over shell protocol · See more »

Fork (software development)

In software engineering, a project fork happens when developers take a copy of source code from one software package and start independent development on it, creating a distinct and separate piece of software.

New!!: Secure Shell and Fork (software development) · See more »

Free software

Free software or libre software is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, and distribute it and any adapted versions.

New!!: Secure Shell and Free software · See more »

FreeBSD

FreeBSD is a free and open-source Unix-like operating system descended from Research Unix via the Berkeley Software Distribution (BSD).

New!!: Secure Shell and FreeBSD · See more »

Freeware

Freeware is software that is available for use at no monetary cost.

New!!: Secure Shell and Freeware · See more »

FTPS

FTPS (also known as FTPES, FTP-SSL, and FTP Secure) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.

New!!: Secure Shell and FTPS · See more »

Generic Security Services Application Program Interface

The Generic Security Service Application Program Interface (GSSAPI, also GSS-API) is an application programming interface for programs to access security services.

New!!: Secure Shell and Generic Security Services Application Program Interface · See more »

GNU Multiple Precision Arithmetic Library

GNU Multiple Precision Arithmetic Library (GMP) is a free library for arbitrary-precision arithmetic, operating on signed integers, rational numbers, and floating point numbers.

New!!: Secure Shell and GNU Multiple Precision Arithmetic Library · See more »

Helsinki University of Technology

The Helsinki University of Technology (TKK; Teknillinen korkeakoulu; Tekniska högskolan) was a technical university in Finland.

New!!: Secure Shell and Helsinki University of Technology · See more »

HMAC

In cryptography, an HMAC (sometimes disabbreviated as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.

New!!: Secure Shell and HMAC · See more »

Host (network)

A network host is a computer or other device connected to a computer network.

New!!: Secure Shell and Host (network) · See more »

Ident protocol

The Ident Protocol (Identification Protocol, IDENT), specified in RFC 1413, is an Internet protocol that helps identify the user of a particular TCP connection.

New!!: Secure Shell and Ident protocol · See more »

Integrity

Integrity is the quality of being honest and having strong moral principles, or moral uprightness.

New!!: Secure Shell and Integrity · See more »

International Data Encryption Algorithm

In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991.

New!!: Secure Shell and International Data Encryption Algorithm · See more »

Internet

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.

New!!: Secure Shell and Internet · See more »

Internet Engineering Task Force

The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).

New!!: Secure Shell and Internet Engineering Task Force · See more »

Internet Standard

In computer network engineering, an Internet Standard is a normative specification of a technology or methodology applicable to the Internet.

New!!: Secure Shell and Internet Standard · See more »

Kerberos (protocol)

Kerberos is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

New!!: Secure Shell and Kerberos (protocol) · See more »

Konqueror

Konqueror, a free and open-source web browser and file manager, provides web access and file-viewer functionality for file systems (such as local files, files on a remote FTP server and files in a disk image).

New!!: Secure Shell and Konqueror · See more »

Linux

Linux is a family of free and open-source software operating systems built around the Linux kernel.

New!!: Secure Shell and Linux · See more »

List of DNS record types

This list of DNS record types is an overview of resource records (RRs) permissible in zone files of the Domain Name System (DNS).

New!!: Secure Shell and List of DNS record types · See more »

List of TCP and UDP port numbers

This is a list of TCP and UDP port numbers used by protocols of the application layer of the Internet protocol suite for the establishment of host-to-host connectivity.

New!!: Secure Shell and List of TCP and UDP port numbers · See more »

Login

In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves.

New!!: Secure Shell and Login · See more »

Lsh

lsh is a free software implementation of the Secure Shell (SSH) protocol version 2, by the GNU Project including both server and client programs.

New!!: Secure Shell and Lsh · See more »

MacOS

macOS (previously and later) is a series of graphical operating systems developed and marketed by Apple Inc. since 2001.

New!!: Secure Shell and MacOS · See more »

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

New!!: Secure Shell and Man-in-the-middle attack · See more »

Message authentication code

In cryptography, a message authentication code (MAC), sometimes known as a tag, is a short piece of information used to authenticate a message—in other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed.

New!!: Secure Shell and Message authentication code · See more »

Message Passing Interface

Message Passing Interface (MPI) is a standardized and portable message-passing standard designed by a group of researchers from academia and industry to function on a wide variety of parallel computing architectures.

New!!: Secure Shell and Message Passing Interface · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: Secure Shell and Microsoft Windows · See more »

National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.

New!!: Secure Shell and National Security Agency · See more »

NetBSD

NetBSD is a free and open source Unix-like operating system that descends from Berkeley Software Distribution (BSD), a Research Unix derivative developed at the University of California, Berkeley.

New!!: Secure Shell and NetBSD · See more »

Network service

In computer networking, a network service is an application running at the network application layer and above, that provides data storage, manipulation, presentation, communication or other capability which is often implemented using a client-server or peer-to-peer architecture based on application layer network protocols.

New!!: Secure Shell and Network service · See more »

NT LAN Manager

In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users.

New!!: Secure Shell and NT LAN Manager · See more »

One-time password

A one-time password or pin (OTP) is a password that is valid for only one login session or transaction, on a computer system or other digital device.

New!!: Secure Shell and One-time password · See more »

Open-source model

The open-source model is a decentralized software-development model that encourages open collaboration.

New!!: Secure Shell and Open-source model · See more »

Open-source software

Open-source software (OSS) is a type of computer software whose source code is released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose.

New!!: Secure Shell and Open-source software · See more »

OpenBSD

OpenBSD is a free and open-source Unix-like computer operating system descended from Berkeley Software Distribution (BSD), a Research Unix derivative developed at the University of California, Berkeley.

New!!: Secure Shell and OpenBSD · See more »

OpenSSH

OpenSSH (also known as OpenBSD Secure Shell) is a suite of security-related network-level utilities based on the Secure Shell (SSH) protocol, which help to secure network communications via the encryption of network traffic over multiple authentication methods and by providing secure tunneling capabilities.

New!!: Secure Shell and OpenSSH · See more »

OpenVMS

OpenVMS is a closed-source, proprietary computer operating system for use in general-purpose computing.

New!!: Secure Shell and OpenVMS · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Secure Shell and Operating system · See more »

Packet analyzer

A packet analyzer (also known as a packet sniffer) is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network.

New!!: Secure Shell and Packet analyzer · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Secure Shell and Password · See more »

Plaintext

In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: Secure Shell and Plaintext · See more »

Pluggable authentication module

A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API).

New!!: Secure Shell and Pluggable authentication module · See more »

Port (computer networking)

In computer networking, a port is an endpoint of communication in an operating system, which identifies a specific process or a type of network service running on that system.

New!!: Secure Shell and Port (computer networking) · See more »

Port forwarding

In computer networking, port forwarding or port mapping is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.

New!!: Secure Shell and Port forwarding · See more »

Proprietary software

Proprietary software is non-free computer software for which the software's publisher or another person retains intellectual property rights—usually copyright of the source code, but sometimes patent rights.

New!!: Secure Shell and Proprietary software · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Secure Shell and Public-key cryptography · See more »

PuTTY

PuTTY is a free and open-source terminal emulator, serial console and network file transfer application.

New!!: Secure Shell and PuTTY · See more »

Remote Shell

The remote shell (rsh) is a command line computer program that can execute shell commands as another user, and on another computer across a computer network.

New!!: Secure Shell and Remote Shell · See more »

Request for Comments

In information and communications technology, a Request for Comments (RFC) is a type of publication from the technology community.

New!!: Secure Shell and Request for Comments · See more »

RSA (cryptosystem)

RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.

New!!: Secure Shell and RSA (cryptosystem) · See more »

RSA SecurID

RSA SecurID, formerly referred to as SecurID, is a mechanism developed by Security Dynamics (later RSA Security and now RSA, The Security Division of EMC) for performing two-factor authentication for a user to a network resource.

New!!: Secure Shell and RSA SecurID · See more »

Rsync

rsync is a utility for efficiently transferring and synchronizing files across computer systems, by checking the timestamp and size of files.

New!!: Secure Shell and Rsync · See more »

S/KEY

S/KEY is a one-time password system developed for authentication to Unix-like operating systems, especially from dumb terminals or untrusted public computers on which one does not want to type a long-term password.

New!!: Secure Shell and S/KEY · See more »

Secure channel

In cryptography, a secure channel is a way of transferring data that is resistant to overhearing and tampering.

New!!: Secure Shell and Secure channel · See more »

Secure copy

Secure copy protocol or SCP is a means of securely transferring computer files between a local host and a remote host or between two remote hosts.

New!!: Secure Shell and Secure copy · See more »

SecurityFocus

SecurityFocus is an online computer security news portal and purveyor of information security services.

New!!: Secure Shell and SecurityFocus · See more »

Shell account

A shell account is a user account on a remote server, traditionally running under the Unix operating system, which gives access to a shell via a command-line interface protocol such as telnet or SSH.

New!!: Secure Shell and Shell account · See more »

Single sign-on

Single sign-on (SSO) is a property of access control of multiple related, yet independent, software systems.

New!!: Secure Shell and Single sign-on · See more »

SOCKS

SOCKS is an Internet protocol that exchanges network packets between a client and server through a proxy server.

New!!: Secure Shell and SOCKS · See more »

Solaris (operating system)

Solaris is a Unix operating system originally developed by Sun Microsystems.

New!!: Secure Shell and Solaris (operating system) · See more »

Spiegel Online

Spiegel Online (SPON) is one of the most widely read German-language news websites.

New!!: Secure Shell and Spiegel Online · See more »

SSH Communications Security

SSH Communications Security Corp. is a cybersecurity company focusing on encryption and access control solutions to help its customers meet compliance requirements, improve their security posture, and save on operational costs.

New!!: Secure Shell and SSH Communications Security · See more »

SSH File Transfer Protocol

In computing, the SSH File Transfer Protocol (also Secure File Transfer Protocol, or SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream.

New!!: Secure Shell and SSH File Transfer Protocol · See more »

Ssh-keygen

ssh-keygen is a standard component of the Secure Shell (SSH) protocol suite found on Unix and Unix-like computer systems used to establish secure shell sessions between remote computers over insecure networks, through the use of various cryptographic techniques.

New!!: Secure Shell and Ssh-keygen · See more »

SSHFS

In computing, SSHFS (SSH Filesystem) is a filesystem client to mount and interact with directories and files located on a remote server or workstation over a normal ssh connection.

New!!: Secure Shell and SSHFS · See more »

Stream Control Transmission Protocol

The Stream Control Transmission Protocol (SCTP) is a computer networking communications protocol which operates at the transport layer and serves a role similar to the popular protocols TCP and UDP.

New!!: Secure Shell and Stream Control Transmission Protocol · See more »

Telnet

Telnet is a protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

New!!: Secure Shell and Telnet · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: Secure Shell and Transport Layer Security · See more »

Tunneling protocol

In computer networks, a tunneling protocol is a communications protocol that allows for the secure movement of data from one network to another.

New!!: Secure Shell and Tunneling protocol · See more »

UMAC

In cryptography, a message authentication code based on universal hashing, or UMAC, is a type of message authentication code (MAC) calculated choosing a hash function from a class of hash functions according to some secret (random) process and applying it to the message.

New!!: Secure Shell and UMAC · See more »

United States Computer Emergency Readiness Team

The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD).

New!!: Secure Shell and United States Computer Emergency Readiness Team · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Secure Shell and Unix · See more »

Unix shell

A Unix shell is a command-line interpreter or shell that provides a traditional Unix-like command line user interface.

New!!: Secure Shell and Unix shell · See more »

Unix-like

A Unix-like (sometimes referred to as UN*X or *nix) operating system is one that behaves in a manner similar to a Unix system, while not necessarily conforming to or being certified to any version of the Single UNIX Specification.

New!!: Secure Shell and Unix-like · See more »

Virtual private network

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

New!!: Secure Shell and Virtual private network · See more »

Web-based SSH

Web-based SSH makes it possible to access Secure Shell (SSH) servers through standard web browsers.

New!!: Secure Shell and Web-based SSH · See more »

WinSCP

WinSCP (Windows Secure Copy) is a free and open-source SFTP, FTP, WebDAV, Amazon S3 and SCP client for Microsoft Windows.

New!!: Secure Shell and WinSCP · See more »

Working group

A working group or working party is a group of experts working together to achieve specified goals.

New!!: Secure Shell and Working group · See more »

X Window System

The X Window System (X11, or shortened to simply X) is a windowing system for bitmap displays, common on UNIX-like computer operating systems.

New!!: Secure Shell and X Window System · See more »

X.509

In cryptography, X.509 is a standard that defines the format of public key certificates.

New!!: Secure Shell and X.509 · See more »

Redirects here:

OSSH, Port 22, Public SSH key, SSH, SSH public key, SSH tunelling, SSH without password in Linux, SSH-1.99, SSHTunnels, SSh, Secure Shell Host, Secure shell, Ssh, Ssh -X, Ssh URI scheme, Ssh: URI, Ssh://.

References

[1] https://en.wikipedia.org/wiki/Secure_Shell

OutgoingIncoming
Hey! We are on Facebook now! »