SHARE
Facebook X Pinterest WhatsApp

DevShed: The Shell Game [Using SSH To Secure Your Connections]

Written By
thumbnail
Web Webster
Web Webster
May 31, 2000

[ Thanks to Randy
Cosby
for this link. ]

“…telnet is a relatively insecure way of working over the
Internet. A telnet connection is typically unencrypted, and offers
experienced hackers – or bored twelve-year-olds – a number of
opportunities to tap into your connection and siphon off
information from the data stream flowing back and forth. What is
needed is a more secure communication protocol, one which is immune
to IP-based attacks, and which uses hard-to-crack cryptographic
techniques to protect the data it carries.”

“Like telnet, SSH is a program designed to let you log in to
other computers on a network. However, unlike telnet, all the data
flowing back and forth in an SSH session is encrypted, and thus
secured from hackers attempting to eavesdrop on the
connection.
Passwords, for example, are sent over a telnet
connection in clear-text, and are vulnerable to interception –
however, SSH always encrypts data transmissions and thus secures
sensitive information from falling into the hands of others.”

“SSH also offers numerous improvements to the other remote login
programs – rlogin, rsh and rcp. Where rlogin and rsh depend on a
flat file to establish whether or not to allow remote hosts and
users access, SSH relies on public/private key authentication to
avoid the use of IP-spoofing or DNS-based attacks.”

“Finally, SSH allows X11 forwarding, allowing the encryption of
all X11 data, and TCP port forwarding, which makes it possible to
communicate with other ports on the remote system [and systems that
may be further connected to it] via the secure SSH channel, as
well.”

Complete
Story

thumbnail
Web Webster

Web Webster

Web Webster has more than 20 years of writing and editorial experience in the tech sector. He’s written and edited news, demand generation, user-focused, and thought leadership content for business software solutions, consumer tech, and Linux Today, he edits and writes for a portfolio of tech industry news and analysis websites including webopedia.com, and DatabaseJournal.com.

Recommended for you...

A Thorough Approach to Improve the Privacy and Security of Your Linux PC
Damien
Oct 24, 2024
Several Russian Maintainers Removed From Linux Kernel Due To Compliance Concerns
Senthil Kumar
Oct 23, 2024
OpenSSH Splits Again: New Authentication Binary Unveiled
Bobby Borisov
Oct 16, 2024
13 Best Free and Open Source Anti-Malware Tools
webmaster
Oct 14, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.