1. Introduction and evolution of the SSH protocol
The SSH protocol , or Secure Shell, was developed in 1995 by Tatun Ylönen, a Finnish professor who, at the time, wanted to secure remote connections to a Unix server via commands such as telnet, rlogin, copy and so on.
SSH is both a protocol and a set of programs using this protocol. It enables users to open interactive sessions with remote servers from a client machine, and transfer files between the two. SSH uses the SOCKS v5 protocol, integrated into most network equipment, to establish secure end-to-end communications. Applications based on SOCKS v5
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Introduction and evolution of the SSH protocol
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
References
Books
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!