Improve Security with SSH remote login

Bookmark and Share
Now is not the era of telnet, because it is not very secure. Information when you type telnet can be stolen easily. Was time to switch your ssh. Remote login facility that allows a user to run system commands from the remote, have been developed from time to time. On the one hand, this facility provides benefits to users, as they no longer must be limited by location, but on the other hand, this facility opened for cleft hands nothing to disrupt the system.

Since the use of telnet as a remote login program be abandoned, the de facto ssh remote login program is the most widely used, because ssh is relatively safe compared with other methods. However, ssh is not to ensure full penetration will not occur. Because of that, this paper made to further improve security remote login using ssh. This for most readers are not using the ssh client to perform a remote login session.

SSH (ssh client) is a program that used logging a machine to another. With SSH, users can execute the commands that are available on other machines. SSH is intended as a substitute for RSH and rlogin, to provide secure communications and encrypted between two hosts using the network as we know it is not safe.

As previously mentioned, here the interaction occurs between two untrusted host. One of the untrusted host is to act as SSH server host, while the other as the SSH client host. SSH server host run a program called sshd daemon that provides services for logging, while the SSH client host using the SSH client program (the next will only be used to call ssh SSH client) to access sshd. Both ssh and sshd, on UNIX like distrubusi such as BSD and GNU / Linux is already available almost on a standard installation. In the BSD and GNU / Linux distribution packages usually use ssh OpenSSH. Similarly, in this paper, for as you use the OpenSSH package and the ssh sshd.

{ 0 komentar... Views All / Send Comment! }