About: SSH   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

SSH is the most popular method for connecting to remote computers to run Unix commands. It is secure alternative to rsh, rlogin, and telnet. The leading implementation is OpenSSH. The source code for OpenSSH is free, meaning that anyone can check how safe it is. Most BSD, Linux, and Unix vendors include OpenSSH. In short, telnet is obsolete, except in applications that require no security. This page ought to discuss: * Who uses SSH? * How was SSH developed? * What are the SSH implementations? (OpenSSH is not the only one.) * Can I get an SSH account somewhere?

AttributesValues
rdfs:label
  • Ssh
  • SSH
  • SSH
  • SSH
rdfs:comment
  • __NOEDITSECTION__
  • SSH is the most popular method for connecting to remote computers to run Unix commands. It is secure alternative to rsh, rlogin, and telnet. The leading implementation is OpenSSH. The source code for OpenSSH is free, meaning that anyone can check how safe it is. Most BSD, Linux, and Unix vendors include OpenSSH. In short, telnet is obsolete, except in applications that require no security. This page ought to discuss: * Who uses SSH? * How was SSH developed? * What are the SSH implementations? (OpenSSH is not the only one.) * Can I get an SSH account somewhere?
  • Pierwsza lepsza strona o ssh: [1]
  • The acronym SSH may refer to: * Secure Shell * Security Standards Handbook (Department of State)
  • SSH is an encrypted CLI protocol, much like telnet, except encrypted.
  • Секъюрность издавна привлекала внимание первобытных людей, начиная с неандертальцев.
  • Secure Shell also known as ssh is an encrypted data transfer technique. This technique is used in three ways. First and most common use is a secure remote connection to a system to have terminal access remotely. This function is known as ssh and is the first thing that comes to many peoples minds when ssh is mentioned. The second most used function is Secure Copy also known as scp. The third and final function is Secure File Transfer Protocol also known as sftp.
  • ssh - for Secure Shell - is a secure alternative to telnet and rlogin. Most modern Linux distributions will simply forbid you to run a telnet server anyway. First create a user to be used when logging in over ssh adduser foobar If adduser didn't ask for a password, add that with passwd foobar This is important as some people will scream blood and murder if they see you connecting as root using ssh. To install ssh do this: * Debian - apt-get install ssh * Gentoo - ssh is already there, edit /etc/ssh/sshd_config * Fedora - ssh is already there and working ps -ef | grep ssh
  • SSH (англ. Secure Shell — «безопасная оболочка») — сетевой протокол прикладного уровня, позволяющий производить удалённое управление операционной системой и туннелирование TCP-соединений (например, для передачи файлов). Сходен по функциональности с протоколами Telnet и rlogin, но, в отличие от них, шифрует весь трафик, включая и передаваемые пароли. SSH допускает выбор различных алгоритмов шифрования. SSH-клиенты и SSH-серверы имеются для большинства сетевых операционных систем.
sameAs
dcterms:subject
dbkwik:resource/9AXiqEjPKQ6Z9TSFEgu5Dg==
  • 89(xsd:integer)
dbkwik:resource/GdOBDp1YTbe31Fg0ScrhHw==
  • 5(xsd:integer)
Название
  • Secure Shell
Уровень
  • Прикладной
dbkwik:de.vronipla...iPageUsesTemplate
dbkwik:mind-contro...iPageUsesTemplate
dbkwik:ru.musorosv...iPageUsesTemplate
dbkwik:internet/pr...iPageUsesTemplate
dbkwik:resource/3rcF_BiuJxPrbGQBrfsyOQ==
  • 22(xsd:integer)
dbkwik:resource/YeGGw6Yfq3y7kw_iaUcxDg==
dbkwik:resource/lljCtJt_n_PR6p3-um-hzw==
dbkwik:resource/lpoYstHSgYmwr5RsbJJRPQ==
  • RFC 4251
dbkwik:resource/nGjGoZ-snT725EG87t0H2Q==
  • SSH
dbkwik:resource/pdwEFwOQCTyLoNgXVlwf6w==
dbkwik:resource/Dg4ckCtII3pE__x3db5eIw==
  • --11-14
dbkwik:resource/XuMugTAwmnknHJH5cCOQ2g==
  • absurd
dbkwik:resource/nr6COcsgf5HxHYbIfD1BMw==
  • Ктулху Фхтагн
dbkwik:resource/vIAsgfDOcG8c5wFT0lGvZw==
  • --12-15
dbkwik:resource/bQNDBcF04qx7rkpVsnLy1A==
  • Удалённый доступ
abstract
  • __NOEDITSECTION__
  • ssh - for Secure Shell - is a secure alternative to telnet and rlogin. Most modern Linux distributions will simply forbid you to run a telnet server anyway. First create a user to be used when logging in over ssh adduser foobar If adduser didn't ask for a password, add that with passwd foobar This is important as some people will scream blood and murder if they see you connecting as root using ssh. To install ssh do this: * Debian - apt-get install ssh * Gentoo - ssh is already there, edit /etc/ssh/sshd_config * Fedora - ssh is already there and working The rest of this text will be for Debian Etch 4.0, as that is the distribution I use. I'm sure a lot of the commands will work in other distributions as well though OpenSSH should be running after issuing apt-get install ssh. To check this run ps -ef | grep ssh The output should look similar to this if everything is working root 764 1 0 10:51 ? 00:00:00 /usr/sbin/sshd root 778 519 0 11:02 tty1 00:00:00 grep ssh Now stop root from being able to log in by setting PermitRootLogin no in /etc/ssh/sshd_config. The setting is already in the file, but set to yes. After you have edited the sshd_config file you need to restart the ssh deamon /etc/init.d/sshd restart If you need to do something with root privileges you can just login using the account you created earlier (foobar) and then use su -. You will be asked for the root password, and then you can do anything root can. To connect to the ssh daemon you need a ssh client like Putty.
  • SSH is the most popular method for connecting to remote computers to run Unix commands. It is secure alternative to rsh, rlogin, and telnet. The leading implementation is OpenSSH. The source code for OpenSSH is free, meaning that anyone can check how safe it is. Most BSD, Linux, and Unix vendors include OpenSSH. In short, telnet is obsolete, except in applications that require no security. This page ought to discuss: * Who uses SSH? * How was SSH developed? * What are the SSH implementations? (OpenSSH is not the only one.) * Can I get an SSH account somewhere?
  • Pierwsza lepsza strona o ssh: [1]
  • SSH (англ. Secure Shell — «безопасная оболочка») — сетевой протокол прикладного уровня, позволяющий производить удалённое управление операционной системой и туннелирование TCP-соединений (например, для передачи файлов). Сходен по функциональности с протоколами Telnet и rlogin, но, в отличие от них, шифрует весь трафик, включая и передаваемые пароли. SSH допускает выбор различных алгоритмов шифрования. SSH-клиенты и SSH-серверы имеются для большинства сетевых операционных систем. SSH позволяет безопасно передавать в незащищенной среде практически любой другой сетевой протокол, таким образом, можно не только удаленно работать на компьютере через командную оболочку, но и передавать по шифрованному каналу звуковой поток или видео (например, с веб-камеры). Также SSH может использовать сжатие передаваемых данных для последующего их шифрования, что удобно, например, для удаленного запуска клиентов X Window System. Большинство хостинг-провайдеров за определенную плату предоставляют клиентам доступ к их домашнему каталогу по SSH. Это может быть удобно как для работы в командной строке, так и для удаленного запуска программ (в том числе графических приложений).
  • The acronym SSH may refer to: * Secure Shell * Security Standards Handbook (Department of State)
  • Secure Shell also known as ssh is an encrypted data transfer technique. This technique is used in three ways. First and most common use is a secure remote connection to a system to have terminal access remotely. This function is known as ssh and is the first thing that comes to many peoples minds when ssh is mentioned. The second most used function is Secure Copy also known as scp. The third and final function is Secure File Transfer Protocol also known as sftp. There are two forms of Secure Shell. The first is the actual ssh software developed by SSH Communications Security. The second is openssh using the BSD license. However, some of the components use different licenses that are even more allowing and forth coming in the distribution aspects. The ssh that is included in Fedora and every other Linux distribution is openssh.
  • SSH is an encrypted CLI protocol, much like telnet, except encrypted.
  • Секъюрность издавна привлекала внимание первобытных людей, начиная с неандертальцев.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software