Posted by Benjamin Close on November 8, 2008 under Other |

Using External SSH access with normal password authentication is dangerous. It is susceptible to the following problems: People can use weak passwords which are easy to hack A remote machine may have a key logger on it Someone may be performing a man-in-the-middle type attack Hence if you wish to access a shell account or [..more..]
Posted by Benjamin Close on November 7, 2008 under Computers, OpenSource |

Using SSH for Automatic Key authentication SSH provides an encrypted tunnel for use with interactive and non interactive terminal sessions. It provides authentication via a number of methods including password, public/private key pairs and challenge keys. SSH also provides authentication forwarding between machines. This feature allows a user to be able to log on to [..more..]