117 relations: Apple Inc., Ars Technica, Authentication, Backward compatibility, BEEP, Berkeley r-commands, Berkeley Software Distribution, Broadcast domain, Campus network, Client (computing), Client–server model, Command-line interface, Communication protocol, Comparison of SSH clients, Comparison of SSH servers, Computer security, Core Security Technologies, Corkscrew (program), Cryptography, Cyclic redundancy check, Cygwin, Daemon (computing), Daniel J. Barrett, Der Spiegel, Diffie–Hellman key exchange, Digital Signature Algorithm, Dropbear (software), EdDSA, Edward Snowden, Elliptic Curve Digital Signature Algorithm, Elliptic-curve Diffie–Hellman, Encryption, Fast and Secure Protocol, File system, File Transfer Protocol, Files transferred over shell protocol, Fork (software development), Free software, FreeBSD, Freeware, FTPS, Generic Security Services Application Program Interface, GNU Multiple Precision Arithmetic Library, Helsinki University of Technology, HMAC, Host (network), Ident protocol, Integrity, International Data Encryption Algorithm, Internet, ..., Internet Engineering Task Force, Internet Standard, Kerberos (protocol), Konqueror, Linux, List of DNS record types, List of TCP and UDP port numbers, Login, Lsh, MacOS, Man-in-the-middle attack, Message authentication code, Message Passing Interface, Microsoft Windows, National Security Agency, NetBSD, Network service, NT LAN Manager, One-time password, Open-source model, Open-source software, OpenBSD, OpenSSH, OpenVMS, Operating system, Packet analyzer, Password, Plaintext, Pluggable authentication module, Port (computer networking), Port forwarding, Proprietary software, Public-key cryptography, PuTTY, Remote Shell, Request for Comments, RSA (cryptosystem), RSA SecurID, Rsync, S/KEY, Secure channel, Secure copy, SecurityFocus, Shell account, Single sign-on, SOCKS, Solaris (operating system), Spiegel Online, SSH Communications Security, SSH File Transfer Protocol, Ssh-keygen, SSHFS, Stream Control Transmission Protocol, Telnet, Transport Layer Security, Tunneling protocol, UMAC, United States Computer Emergency Readiness Team, Unix, Unix shell, Unix-like, Virtual private network, Web-based SSH, WinSCP, Working group, X Window System, X.509. Expand index (67 more) » « Shrink index
Apple Inc. is an American multinational technology company headquartered in Cupertino, California, that designs, develops, and sells consumer electronics, computer software, and online services.
Ars Technica (a Latin-derived term that the site translates as the "art of technology") is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998.
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.
Backward compatibility is a property of a system, product, or technology that allows for interoperability with an older legacy system, or with input designed for such a system, especially in telecommunications and computing.
The Blocks Extensible Exchange Protocol (BEEP) is a framework for creating network application protocols.
The Berkeley r-commands are a suite of computer programs designed to enable users of one Unix system to log in or issue commands to another Unix computer via TCP/IP computer network.
Berkeley Software Distribution (BSD) was a Unix operating system derivative developed and distributed by the Computer Systems Research Group (CSRG) of the University of California, Berkeley, from 1977 to 1995.
A broadcast domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer.
A campus network, campus area network, corporate area network or CAN is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area.
A client is a piece of computer hardware or software that accesses a service made available by a server.
The client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.
A command-line interface or command language interpreter (CLI), also known as command-line user interface, console user interface and character user interface (CUI), is a means of interacting with a computer program where the user (or client) issues commands to the program in the form of successive lines of text (command lines).
In telecommunication, a communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.
An SSH client is a software program which uses the secure shell protocol to connect to a remote computer.
An SSH server is a software program which uses the secure shell protocol to accept connections from remote computers.
Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
Core Security is an American computer and network security company that provides an attack intelligence platform, vulnerability management and network penetration testing measurement software products and services.
Corkscrew is a program that enables the user to tunnel arbitrary TCP connections through most HTTP and HTTPS proxy servers.
Cryptography or cryptology (from κρυπτός|translit.
A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.
Cygwin is a Unix-like environment and command-line interface for Microsoft Windows.
In multitasking computer operating systems, a daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user.
Daniel J. Barrett (born 1963) is a writer, software engineer, and musician.
Der Spiegel (lit. "The Mirror") is a German weekly news magazine published in Hamburg.
Diffie–Hellman key exchange (DH)Synonyms of Diffie–Hellman key exchange include.
The Digital Signature Algorithm (DSA) is a Federal Information Processing Standard for digital signatures.
Dropbear is a software package written by Matt Johnston that provides a Secure Shell-compatible server and client.
In public-key cryptography, Edwards-curve Digital Signature Algorithm (EdDSA) is a digital signature scheme using a variant of Schnorr signature based on Twisted Edwards curves.
Edward Joseph Snowden (born June 21, 1983) is an American computer professional, former Central Intelligence Agency (CIA) employee, and former contractor for the United States government who copied and leaked classified information from the National Security Agency (NSA) in 2013 without authorization.
In cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic curve cryptography.
Elliptic-curve Diffie–Hellman (ECDH) is an anonymous key agreement protocol that allows two parties, each having an elliptic-curve public–private key pair, to establish a shared secret over an insecure channel.
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
The Fast and Secure Protocol (FASP) is a proprietary data transfer protocol.
In computing, a file system or filesystem controls how data is stored and retrieved.
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.
Files transferred over Shell protocol (FISH) is a network protocol that uses Secure Shell (SSH) or Remote Shell (RSH) to transfer files between computers and manage remote files.
In software engineering, a project fork happens when developers take a copy of source code from one software package and start independent development on it, creating a distinct and separate piece of software.
Free software or libre software is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, and distribute it and any adapted versions.
FreeBSD is a free and open-source Unix-like operating system descended from Research Unix via the Berkeley Software Distribution (BSD).
Freeware is software that is available for use at no monetary cost.
FTPS (also known as FTPES, FTP-SSL, and FTP Secure) is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.
The Generic Security Service Application Program Interface (GSSAPI, also GSS-API) is an application programming interface for programs to access security services.
GNU Multiple Precision Arithmetic Library (GMP) is a free library for arbitrary-precision arithmetic, operating on signed integers, rational numbers, and floating point numbers.
The Helsinki University of Technology (TKK; Teknillinen korkeakoulu; Tekniska högskolan) was a technical university in Finland.
In cryptography, an HMAC (sometimes disabbreviated as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.
A network host is a computer or other device connected to a computer network.
The Ident Protocol (Identification Protocol, IDENT), specified in RFC 1413, is an Internet protocol that helps identify the user of a particular TCP connection.
Integrity is the quality of being honest and having strong moral principles, or moral uprightness.
In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991.
The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.
The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).
In computer network engineering, an Internet Standard is a normative specification of a technology or methodology applicable to the Internet.
Kerberos is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
Konqueror, a free and open-source web browser and file manager, provides web access and file-viewer functionality for file systems (such as local files, files on a remote FTP server and files in a disk image).
Linux is a family of free and open-source software operating systems built around the Linux kernel.
This list of DNS record types is an overview of resource records (RRs) permissible in zone files of the Domain Name System (DNS).
This is a list of TCP and UDP port numbers used by protocols of the application layer of the Internet protocol suite for the establishment of host-to-host connectivity.
In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves.
lsh is a free software implementation of the Secure Shell (SSH) protocol version 2, by the GNU Project including both server and client programs.
macOS (previously and later) is a series of graphical operating systems developed and marketed by Apple Inc. since 2001.
In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
In cryptography, a message authentication code (MAC), sometimes known as a tag, is a short piece of information used to authenticate a message—in other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed.
Message Passing Interface (MPI) is a standardized and portable message-passing standard designed by a group of researchers from academia and industry to function on a wide variety of parallel computing architectures.
Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.
NetBSD is a free and open source Unix-like operating system that descends from Berkeley Software Distribution (BSD), a Research Unix derivative developed at the University of California, Berkeley.
In computer networking, a network service is an application running at the network application layer and above, that provides data storage, manipulation, presentation, communication or other capability which is often implemented using a client-server or peer-to-peer architecture based on application layer network protocols.
In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users.
A one-time password or pin (OTP) is a password that is valid for only one login session or transaction, on a computer system or other digital device.
The open-source model is a decentralized software-development model that encourages open collaboration.
Open-source software (OSS) is a type of computer software whose source code is released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose.
OpenBSD is a free and open-source Unix-like computer operating system descended from Berkeley Software Distribution (BSD), a Research Unix derivative developed at the University of California, Berkeley.
OpenSSH (also known as OpenBSD Secure Shell) is a suite of security-related network-level utilities based on the Secure Shell (SSH) protocol, which help to secure network communications via the encryption of network traffic over multiple authentication methods and by providing secure tunneling capabilities.
OpenVMS is a closed-source, proprietary computer operating system for use in general-purpose computing.
An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
A packet analyzer (also known as a packet sniffer) is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network.
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.
In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.
A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API).
In computer networking, a port is an endpoint of communication in an operating system, which identifies a specific process or a type of network service running on that system.
In computer networking, port forwarding or port mapping is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.
Proprietary software is non-free computer software for which the software's publisher or another person retains intellectual property rights—usually copyright of the source code, but sometimes patent rights.
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
PuTTY is a free and open-source terminal emulator, serial console and network file transfer application.
The remote shell (rsh) is a command line computer program that can execute shell commands as another user, and on another computer across a computer network.
In information and communications technology, a Request for Comments (RFC) is a type of publication from the technology community.
RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.
RSA SecurID, formerly referred to as SecurID, is a mechanism developed by Security Dynamics (later RSA Security and now RSA, The Security Division of EMC) for performing two-factor authentication for a user to a network resource.
rsync is a utility for efficiently transferring and synchronizing files across computer systems, by checking the timestamp and size of files.
S/KEY is a one-time password system developed for authentication to Unix-like operating systems, especially from dumb terminals or untrusted public computers on which one does not want to type a long-term password.
In cryptography, a secure channel is a way of transferring data that is resistant to overhearing and tampering.
Secure copy protocol or SCP is a means of securely transferring computer files between a local host and a remote host or between two remote hosts.
SecurityFocus is an online computer security news portal and purveyor of information security services.
A shell account is a user account on a remote server, traditionally running under the Unix operating system, which gives access to a shell via a command-line interface protocol such as telnet or SSH.
Single sign-on (SSO) is a property of access control of multiple related, yet independent, software systems.
SOCKS is an Internet protocol that exchanges network packets between a client and server through a proxy server.
Solaris is a Unix operating system originally developed by Sun Microsystems.
Spiegel Online (SPON) is one of the most widely read German-language news websites.
SSH Communications Security Corp. is a cybersecurity company focusing on encryption and access control solutions to help its customers meet compliance requirements, improve their security posture, and save on operational costs.
In computing, the SSH File Transfer Protocol (also Secure File Transfer Protocol, or SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream.
ssh-keygen is a standard component of the Secure Shell (SSH) protocol suite found on Unix and Unix-like computer systems used to establish secure shell sessions between remote computers over insecure networks, through the use of various cryptographic techniques.
In computing, SSHFS (SSH Filesystem) is a filesystem client to mount and interact with directories and files located on a remote server or workstation over a normal ssh connection.
The Stream Control Transmission Protocol (SCTP) is a computer networking communications protocol which operates at the transport layer and serves a role similar to the popular protocols TCP and UDP.
Telnet is a protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.
Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.
In computer networks, a tunneling protocol is a communications protocol that allows for the secure movement of data from one network to another.
In cryptography, a message authentication code based on universal hashing, or UMAC, is a type of message authentication code (MAC) calculated choosing a hash function from a class of hash functions according to some secret (random) process and applying it to the message.
The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD).
Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.
A Unix shell is a command-line interpreter or shell that provides a traditional Unix-like command line user interface.
A Unix-like (sometimes referred to as UN*X or *nix) operating system is one that behaves in a manner similar to a Unix system, while not necessarily conforming to or being certified to any version of the Single UNIX Specification.
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
Web-based SSH makes it possible to access Secure Shell (SSH) servers through standard web browsers.
WinSCP (Windows Secure Copy) is a free and open-source SFTP, FTP, WebDAV, Amazon S3 and SCP client for Microsoft Windows.
A working group or working party is a group of experts working together to achieve specified goals.
The X Window System (X11, or shortened to simply X) is a windowing system for bitmap displays, common on UNIX-like computer operating systems.
In cryptography, X.509 is a standard that defines the format of public key certificates.
OSSH, Port 22, Public SSH key, SSH, SSH public key, SSH tunelling, SSH without password in Linux, SSH-1.99, SSHTunnels, SSh, Secure Shell Host, Secure shell, Ssh, Ssh -X, Ssh URI scheme, Ssh: URI, Ssh://.