Secure Shell


Also found in: Acronyms, Wikipedia.

Secure Shell

(operating system)
(ssh) A Unix shell program for logging into, and executing commands on, a remote computer. ssh is intended to replace rlogin and rsh, and provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel.

http://cs.hut.fi/ssh/.
References in periodicals archive ?
Available secure shell access and SDKs for custom user-written applications.
Created to connect remote servers and clients more securely using encryption, authentication and other security mechanisms, Secure Shell (SSH) still has its share of vulnerabilities.
Pragma FortressSSH is an enterprise-grade secure shell (SSH), secure file transfer (SFTP) and secure copy (SCP) server for the Windows.
IBM observed a large spike in this sort of password guessing activity directed at secure shell servers (SSH) in the later half of 2011.
* Organisations should use digital certificates and asymmetric and Secure Shell (SSH) encryption keys to encrypt all data flowing between users and applications, as well as data moving between applications.
They designed the willow baskets to provide a secure shell in which the birds could then build their own nests.
Attachmate Corporation, Seattle, has announced the availability of Attachmate Reflection for Secure IT 7.2, the company's family of secure shell (SSH) servers and clients for UNIX, Linux and Windows operating systems.
It incorporates SSLv3 (Secure Sockets Layer v3) and SSHv3 (Secure Shell v3) enhanced security on the management port for the web graphical user interface (GUI) and a Telnet interface.
A virtual network server client tool and secure shell are used in ORTSTARS to enable application sharing between the Unix and Windows operating systems through a secure network.
Requirement one instructs organizations to "install and maintain a firewall configuration to protect cardholder data." Certain protocols--including Secure Sockets Layer (SSL) and Secure Shell (SSH)--may pass through the firewall without special justification or documentation.
Hackers have borrowed a tactic from the world's first iPhone worm to build a botnet that steals data, including online banking credentials, from jailbroken Apple smartphones.<p>A new worm, dubbed "Duh" by U.K.-based security firm Sophos, is related to the "ikee" worm released earlier this month only in its approach, not in its code, said Chester Wisniewski, a senior security advisory with Sophos.<p>"It's different code, but the same conceptually," Wisniewski said today.<p>Both ikee and the new Duh worms take advantage of the default password used by the SSH (secure shell) Unix utility, which is installed by some users after they've "jailbroken" their iPhones.
Chief Thomasian said the goal of the building committee, architect and general contractor is to have a secure shell in place along with a base amount of asphalt for driveways and parking by the end of November, or before snow flies.

Full browser ?