From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from int-mx1.corp.redhat.com (int-mx1.corp.redhat.com [172.16.44.254]) by listman.redhat.com (Postfix) with ESMTP id AA3763F390 for ; Tue, 20 Nov 2001 09:59:11 -0500 (EST) Received: from mail.redhat.com (mail.redhat.com [199.183.24.239]) by int-mx1.corp.redhat.com (8.11.6/8.11.6) with SMTP id fAKExBp10801 for ; Tue, 20 Nov 2001 09:59:11 -0500 Received: (from mail@localhost) by mail.redhat.com (8.11.0/8.8.7) id fAKExBB18458 for blinux-list@listman.redhat.com; Tue, 20 Nov 2001 09:59:11 -0500 Received: from cougar.aero-vision.com (cougar.aero-vision.com [207.10.28.10]) by mail.redhat.com (8.11.0/8.8.7) with ESMTP id fAKExBw18453 for ; Tue, 20 Nov 2001 09:59:11 -0500 Received: (from salt@localhost) by cougar.aero-vision.com (8.11.0/8.11.0) id fAKExAg17059 for blinux-list@redhat.com; Tue, 20 Nov 2001 09:59:10 -0500 Date: Tue, 20 Nov 2001 09:59:10 -0500 From: "A. R. Vener" To: blinux-list@redhat.com Subject: ssh Message-ID: <20011120095910.A16463@cougar.aero-vision.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: ; from cbowman@netdoor.com on Tue, Nov 20, 2001 at 08:37:48AM -0600 X-Loop: blinux-list@redhat.com Sender: blinux-list-admin@redhat.com Errors-To: blinux-list-admin@redhat.com X-BeenThere: blinux-list@redhat.com X-Mailman-Version: 2.0.1 Precedence: bulk Reply-To: blinux-list@redhat.com List-Help: List-Post: List-Subscribe: , List-Id: Linux for blind general discussion List-Unsubscribe: , List-Archive: ssh stands for secure shell. It uses the secure socket layer (SSL) to establish a connection machines similar to telnet or rsh. It also includes the secure copy (scp) protocol as part of the suite. I've installed it on my machine and reccommend its use as a replacement to telnet and password requiremed ftp since the password transaction is also encrypted. This is not true for telnet, rsh or ftp. If one of the machines is running an illicit sniffer your password can be acquired by the sniffer operator when establishing a telnet or ftp connection. You'll need to install first the OpenSSL library and then the OpenSSH applications. Try cvhecking out http://www.openssh.com Have fun. rudy